<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.19 (Ruby 3.1.3) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-avoiding-internet-centralization-07" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="Internet Consolidation and Standards">Internet Consolidation: What can Standards Efforts Do?</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-avoiding-internet-centralization-07"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <postal>
          <postalLine>Prahran</postalLine>
          <postalLine>Australia</postalLine>
        </postal>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>governance</keyword>
    <abstract>
      <t>Despite the Internet being designed and operated as a decentralized network-of-networks, forces continuously emerge that encourage consolidation of power over its functions into few hands.</t>
      <t>This document offers a definition of consolidation and relates it to centralization, explains why they are undesirable, identifies forces that contribute to them, catalogues limitations of common approaches to decentralization, and explores what Internet standards efforts can do.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-nottingham-avoiding-internet-centralization/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mnot/avoiding-internet-centralization"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The Internet has succeeded in no small part because of its purposeful avoidance of any single controlling entity. Originating in a desire to prevent a single technical failure from having a wide impact <xref target="RAND"/>, this stance has also enabled the Internet's rapid adoption and broad spread. The Internet can accommodate a spectrum of requirements and is now positioned as a global public good because joining, deploying an application on, or using the Internet does not require permission from or ceding control to a single entity.</t>
      <t>While avoiding consolidation of power on the Internet remains a widely shared goal, achieving it consistently has proven difficult. Today, many successful protocols and applications on the Internet operate in a centralized fashion -- to the point where some proprietary services have become so well-known that they are commonly mistaken for the Internet itself. Even when protocols incorporate techniques intended to prevent consolidation, economic and social factors can drive users to prefer solutions built with or on top of supposedly decentralized technology.</t>
      <t>These difficulties call into question what role architectural design -- in particular, that performed by open standards bodies such as the IETF -- should play in preventing, mitigating, and controlling consolidation of power on the Internet. This document discusses aspects that relate to Internet standards efforts, and argues that while the IETF may not be able to prevent consolidation, there are still meaningful steps we can take to counteract it.</t>
      <t><xref target="centralization"/> defines consolidation and centralization, explains why and when they are undesirable, and surveys how centralization occurs on the Internet. <xref target="decentralization"/> explores decentralization and highlights some relevant techniques, along with their limitations. Finally, <xref target="considerations"/> considers the role that Internet standards play in avoiding consolidation and mitigating its effects.</t>
      <t>The primary audience for this document is the engineers who design and standardize Internet protocols. However, designers of proprietary protocols and applications can benefit from considering these issues, especially if they intend their work to be considered for eventual standardization. Likewise, policymakers can use this document to help identify and remedy inappropriately consolidated protocols and applications.</t>
    </section>
    <section anchor="centralization">
      <name>Consolidation and Centralization</name>
      <t>This document defines "consolidation" as the ability of a single entity or a small group of them to exclusively observe, capture, control, or extract rent from the operation or use of an Internet function.</t>
      <t>Here, "entity" could be a single person, a corporation, or a government. It does not include an organization that operates in a manner that effectively mitigates consolidation (see, e.g., <xref target="multi"/>).</t>
      <t>"Internet function" is defined broadly. It might be an enabling protocol already defined by standards, such as IP <xref target="RFC791"/>, BGP <xref target="RFC4271"/>, TCP <xref target="RFC793"/>, or HTTP <xref target="HTTP"/>. It might also be a proposal for a new enabling protocol, or an extension to an existing one.</t>
      <t>However, the Internet's functions are not limited to standards-defined protocols. User-visible applications built on top of standard protocols are also vulnerable to consolidation -- for example, social networking, file sharing, financial services, and news dissemination. Likewise,  networking equipment, hardware, operating systems, and software act as enabling technologies that can exhibit consolidation. The supply of Internet connectivity to end users in a particular area or situation can also be subject to consolidation, as can supply of transit between networks (so called "Tier 1" networks).</t>
      <t>"Centralization" measures the contribution of a function's technical design to consolidation. As such, it is a primarily architectural phenomenon. For example, many consider the social networking market to be highly consolidated around a few providers who use proprietarily centralized (see <xref target="direct"/>) technology to reinforce their control.</t>
      <t>Centralization is not a binary condition; a function's design might contribute to or be vulnerable to consolidation in multiple ways and various degrees. Even when decentralization techniques are purposefully used to avoid it, centralization often appears in other aspects of the function's design -- for example, in its governance, implementation, deployment, or in ancillary functions. In summary, "decentralized technology alone does not guarantee decentralized outcomes." <xref target="SCHNEIDER"/></t>
      <t>Therefore, this document considers the amount of "consolidation risk" associated with a function's design, depending on the scale, scope, and nature of those contributions and vulnerabilities.</t>
      <section anchor="why">
        <name>Assessing Consolidation Risk</name>
        <t>By default, Internet protocol designers avoid centralized designs because the Internet's very nature is incompatible with centralization. As a "large, heterogeneous collection of interconnected systems" <xref target="BCP95"/> the Internet is often characterised as a "network of networks". These networks relate as peers who agree to facilitate communication, rather than having a relationship of subservience to others' requirements or coercion by them. This focus on independence of action carries through the way the network is architected -- for example, in the concept of an "autonomous system".</t>
        <t>However, as discussed below in <xref target="necessary"/>, not all centralization is avoidable, and in some cases it is even desirable. With that in mind, consolidation risk on the Internet is most concerning when it is not broadly held to be necessary, when it has no checks, balances, or other mechanisms of accountability, when it selects "favorites" which are difficult (or impossible) to displace, and when it threatens to diminish the success factors that enable the Internet to thrive -- scalability to meet the demands of new users, adaptability to encompass new applications, flexibility to enable deployment of new technologies, and resilience to shocks and changes <xref target="SUCCESS"/>.</t>
        <t>Most often, consolidation risk is indicated when a proposal has one or more of the following damaging effects (or the potential for them):</t>
        <ul spacing="normal">
          <li>
            <em>Power Imbalance</em>: When a third party has unavoidable access to communications, the informational and positional advantages gained allow observation of behavior (the "panopticon effect") and shaping or even denial of behavior (the "chokepoint effect") <xref target="INTERMEDIARY-INFLUENCE"/> -- capabilities that those parties (or the states that have authority over them) can use for coercive ends <xref target="INTERDEPENDENCE"/> or even to disrupt society itself. Just as good governance of states requires separation of powers <xref target="FEDERALIST-51"/>, so too does good governance of the Internet require that power not be concentrated in one place without appropriate checks and balances.</li>
          <li>
            <em>Limits on Innovation</em>: Consolidation can preclude the possibility of "permissionless innovation" -- the ability to deploy new, unforeseen applications without requiring coordination with parties other than those you are communicating with.</li>
          <li>
            <em>Constraints on Competition</em>: The Internet and its users benefit from robust competition when applications and services are available from many providers -- especially when those users can build their own applications and services based upon interoperable standards. When a consolidated service or platform must be used because no substitutes are suitable, it effectively becomes an essential facility, which encourages abuse of power.</li>
          <li>
            <em>Reduced Availability</em>: Availability of the Internet (and applications and services built upon it) improves when there are many ways to obtain access. While service availability can benefit from the focused attention of a large consolidated provider, that provider's failure can have a disproportionate impact on availability.</li>
          <li>
            <em>Monoculture</em>: The scale available to a consolidated provider can magnify minor flaws in features to a degree that can have broad consequences. For example, a single codebase for routers elevates the impact of a bug or vulnerability; a single recommendation algorithm for content can have severe social impact. Diversity in functions' implementation leads to a more robust outcome when viewed systemically, because "progress is the outcome of a trial-and-error evolutionary process of many agents interacting freely." <xref target="POLYCENTRIC"/></li>
          <li>
            <em>Self-Reinforcement</em>: As widely noted (see, e.g., <xref target="ACCESS"/>), a consolidated provider's access to data allows it the opportunity to make improvements to its offerings, while denying such access to others.</li>
        </ul>
        <t>However, these are only indicators, and each needs to be evaluated carefully on a case-by-case basis.</t>
        <t>For example, it is important to distinguish consolidation risk from anticompetitive concerns (also known as "antitrust"). While there are many interactions between these concepts and making the Internet more competitive may be a motivation for avoiding centralization, only courts (and in some cases, regulators) have the authority to define a relevant market and determine that behavior is anti-competitive. Furthermore, what might be considered undesirable consolidation by the technical community might not attract competition regulation, and conversely what might attract competition regulation might not be of great concern to the technical community if other mitigations are felt to be adequate.</t>
        <t>Likewise, while centralization interacts with availability, they are distinct and any relationship between them cannot be assumed without careful analysis of where and how centralization occurs. Centralized systems might be more available due to factors like the resources available to them, but also have greater impact when they encounter a fault; decentralized systems might be more resilient in the face of local failures, but less able to react to systemic issues. Furthermore, a failure due to a cut cable, power outage, or failed server is qualitatively different from the issues encountered when a core Internet function has a gatekeeper.</t>
        <t>For example, a large variety of Web sites might depend upon a cloud hosting provider or content delivery network; if it were to become unavailable (whether for technical or other reasons), many people's experience of the Internet might be disrupted. Likewise, a mobile Internet access provider might have an outage that affects hundreds, thousands, or more of its users. In both cases, consolidation is not indicated by the loss of availability or its scale, but it well might be if the parties relying on the function don't have reasonable options to switch to if they are unhappy with the availability of the service provided, or if friction against switching to an alternative is too great.</t>
      </section>
      <section anchor="kinds">
        <name>How Centralization Occurs</name>
        <t>A function's design can exhibit centralization in a variety of ways. The subsections below describe different contributors to and expressions of centralization in Internet functions. Note that this is not a taxonomy, in that it is not necessarily complete, and there may be overlap.</t>
        <section anchor="direct">
          <name>Proprietary Centralization</name>
          <t>Creating of a protocol or application with a fixed role for a specific party is the most obvious form of centralization. Many messaging, videoconferencing, chat, social networking, and similar applications currently operate in this fashion.</t>
          <t>Because they allow control by a single entity, proprietary protocols are often considered simpler to design, more amenable to evolution, and more likely to meet user needs <xref target="MOXIE"/>, compared to decentralized alternatives. However, they have corresponding consolidation risk -- if the function has no alternative providers, or switching to those providers is too difficult, its users are "locked in."</t>
          <t>Proprietary protocols and applications are not considered as being part of the Internet per se; instead, they are more properly characterized as being built on top of the Internet. The Internet architecture and associated standards do not control them, beyond the constraints that the underlying protocols (e.g., TCP, IP, HTTP) impose.</t>
        </section>
        <section anchor="necessary">
          <name>Beneficial Centralization</name>
          <t>Some protocols and applications have goals that require the introduction of a centralized function. In doing so, they are explicitly relying on centralization to deliver a particular benefit.</t>
          <t>For example, a function that needs a single, globally coordinated "source of truth" is by nature centralized -- such as in the Domain Name System (DNS), which allows human-friendly naming to be converted into network addresses in a globally consistent fashion.</t>
          <t>Another function exhibiting beneficial centralization is IP addresses allocation. Internet routing requires addresses to be allocated uniquely, but if a single government or company captured the addressing function, the entire Internet would be at risk of abuse by that entity. Similarly, the need for coordination in the Web's trust model brings consolidation risk, because of the Certificate Authority's role in communication between clients and servers.</t>
          <t>Protocols that need to solve the "rendezvous problem" to coordinate communication between two parties who are not in direct contact also exhibit beneficial centralization. For example, chat protocols need to coordinate communication between two parties that wish to talk; while the actual communication can be direct between them (so long as the protocol facilitates that), the endpoints' mutual discovery typically requires a third party at some point. From the perspective of those two users, the rendezvous function has consolidation risk.</t>
          <t>A centralized function's inherent power can also be used to beneficial ends. <xref target="AMBITION"/> notes that "centralized structures can have virtues, such as enabling publics to focus their limited attention for oversight, or forming a power bloc capable of challenging less-accountable blocs that might emerge. Centralized structures that have earned widespread respect in recent centuries - including governments, corporations, and nonprofit organizations - have done so in no small part because of the intentional design that went into those structures."</t>
          <t>For example, when traffic from many users is mixed together in a way that can't be distinguished, censorship becomes more difficult. This "too big to block" phenomenon drives the design of many recent protocols (such as <xref target="ECH"/>), but they require a degree of consolidation to meet their goals.</t>
          <t>Likewise, when a function requires governance to realize common goals and protect minority interests, a "choke point" is naturally formed by the chosen governance mechanism, increasing consolidation risk. One commonly seen application of this kind of beneficial centralization is in content moderation functions. Complex and risky functions like financial services (e.g., credit card processing) can be seen as beneficially centralized into relatively few, specialized organizations, where they can received the focused attention that they require.</t>
          <t>When beneficial centralization is present, Internet protocols often attempt to mitigate the associated risks using measures such as federation (see <xref target="federation"/>) or multi-stakeholder governance (see <xref target="multi"/>). Protocols that successfully mitigate the associated consolidation risks are often reused to avoid the considerable cost and risk of re-implementing those mitigations. For example, if a protocol requires a coordinated, global naming function, reusing the Domain Name System is usually preferable to establishing a new system.</t>
          <t>Ultimately, deciding what is beneficial is a judgment call. Some protocols cannot function without a centralized function; others might be significantly enhanced for certain use cases if a function is centralized, or might merely be more efficient. Such judgments should be made in light of established architectural principles and how benefits accrue to end users.</t>
        </section>
        <section anchor="indirect">
          <name>Concentration</name>
          <t>Even when a function avoids proprietary centralization and mitigates any beneficial centralization present, it might become consolidated in practice when external factors influence its deployment, so that few or even just one entity provides the function. This document refers to this phenomenon as "concentration." Economic, legal, and social factors that encourage use of a central function despite the absence of such a requirement in the protocol itself can cause concentration.</t>
          <t>Often, the factors driving concentration are related to the network effects that are so often seen on the Internet. While in theory every node on the Internet is equal, in practice some nodes are much more connected than others: for example, just a few sites drive much of the traffic on the Web. While expected and observed in many kinds of networks, network effects award asymmetric power to nodes that act as intermediaries to communication. <xref target="SCALE-FREE"/></t>
          <t>There may be legitimate qualitative reasons for some nodes being favoured over others. However, when it happens because friction against using an alternative prevents switching, benefits are accrued to services rather than users. If choosing an alternate provider requires a significant amount of time, resources, expertise, coordination, loss of functionality, or effort, consolidation risk is indicated. Conversely, a function based on a well-defined, open specification designed to minimize switching costs might be considered to have less consolidation risk even when there are only a few large providers.</t>
          <t>For example, social networking is an application that is currently supplied by a few proprietary platforms despite standardization efforts (see, e.g., <xref target="ACTIVITYSTREAMS"/>), because of the powerful network effects associated. While there has been some competition in social networking, a group of people who wish to communicate are often locked in by the choices that their peers make, because of the coordination required to move to a new service.</t>
          <t>See <xref target="ISOC"/> for a deeper exploration of concentration.</t>
          <t>Concentration is difficult to avoid in protocol design, and federated protocols are particularly vulnerable to it (see <xref target="federation"/>).</t>
        </section>
        <section anchor="network">
          <name>Inherited Centralization</name>
          <t>Most Internet protocols and applications depend on other, "lower-layer" functions and their implementations. The features, deployment, and operation of these dependencies can surface centralization into functions and applications built "on top" of them.</t>
          <t>For example, the network between endpoints can introduce consolidation risk to application-layer protocols, because it is necessary for communication and therefore has power over it. A network might block access to, slow down, or change the content of various application protocols or specific services for financial, political, operational, or criminal reasons, thereby creating a disincentive (or even removing the ability) to use them. By selectively hindering the use of some services but not others, network interventions can be composed to aid concentration in those other services -- intentionally or not.</t>
          <t>Likewise, having only a single implementation of a protocol is an inherited consolidation risk, because applications that use it are vulnerable to the control it has over their operation. Even Open Source projects can exhibit this risk if there are factors that make forking difficult (for example, the cost of maintaining that fork).</t>
          <t>Inherited centralization surfaces when viable alternatives to these dependencies are not available. It is often present when network effects restrict choices, but can also be created by legal mandates and incentives that restrict the options for a function (such as Internet access), its provision, or the range of implementations available.</t>
          <t>Alternatively, it might occur due to scarcity. For example, the exhaustion of IPv4 addresses creates a power differential between those who have addresses and those who do not, which can affect how the protocols that depend on IP connectivity are deployed and used. If that power is concentrated into few hands, consolidation is the result, in turn leading to ossification because new applications cannot be deployed without their cooperation.</t>
          <t>Some effects of inherited centralization can be mitigated by enforcing layer boundaries through use of techniques like encryption. When the number of parties who have access to content of communication are limited, parties at lower layers can be prevented from interfering with and observing it. Although those lower-layer parties might still prevent communication, encryption also makes it more difficult to discriminate a target from other users' traffic.</t>
          <t>Note that the prohibitive effect of encryption on inherited centralization is most pronounced when most (if not all) traffic is encrypted. See also <xref target="RFC7258"/>.</t>
        </section>
        <section anchor="platform">
          <name>Platform Centralization</name>
          <t>The complement to inherited centralization is platform centralization -- where a function does not directly define a central role, but could facilitate consolidation in the applications it supports.</t>
          <t>For example, HTTP <xref target="HTTP"/> is not generally considered a centralized protocol; interoperable servers are easy to instantiate, and multiple clients are available. It can be used without central coordination beyond that provided by DNS, as discussed above. However, applications built on top of HTTP (as well as the rest of the "Web Platform") often exhibit consolidation (for example, social networking). HTTP is therefore an example of platform centralization -- while the protocol itself is not centralized, it facilitates the creation of consolidated services and applications.</t>
          <t>Like concentration, platform centralization is difficult to prevent with protocol design. Because of the layered nature of the Internet, most protocols allow considerable flexibility in how they are used, often in a way that it becomes attractive to form a dependency on one party's operation.</t>
        </section>
      </section>
    </section>
    <section anchor="decentralization">
      <name>Decentralization</name>
      <t>While the term "decentralization" has a long history of use in economics, politics, religion, and international development, Baran gave one of the first definitions relevant to computer networking, as a condition when "complete reliance upon a single point is not always required." <xref target="RAND"/></t>
      <t>This seemingly straightforward technical definition hides several issues.</t>
      <t>First, identifying which aspects of a function to decentralize and how to do so can be difficult, both because there are often many ways a function might be centralized, and because consolidation sometimes only becomes evident after the function is deployed at scale. Efforts to decentralize often have the effect of merely shifting consolidation to a different place.</t>
      <t>For example, a cloud storage function might be implemented using a distributed consensus protocol, assuring that the failure of any single node will not affect the system's operation or availability. In that sense, it is decentralized. However, if it is operated by a single legal entity, that brings a very different kind of consolidation risk, especially if there are few other options available, or if there is friction against choosing other options.</t>
      <t>Another example is the Web, which was envisioned and widely held to be a decentralizing force in its early life. Its inherent platform centralization only became apparent when large sites successfully leveraged network effects for dominance of social networking, marketplaces, and similar functions.</t>
      <t>Second, different parties might have good-faith differences on what "sufficiently decentralized" means based upon their beliefs, perceptions and goals. Just as consolidation is a continuum, so is decentralization, and not everyone agrees one what the "right" level or type is, how to weigh different forms of consolidation against each other, or how to weigh consolidation against other architectural goals (such as security or privacy).</t>
      <t>These tensions can be seen, for example, in the DNS. While much of the system is decentralized through the distribution of the lookup function to local servers that users have the option to override, the DNS is also a name space -- a single, global "source of truth" with inherent (if beneficial) centralization of its management. The associated risk is mitigated through multi-stakeholder governance by ICANN (see <xref target="multi"/>). While many believe that this arrangement is sufficient and might even have desirable qualities (such as the ability to impose community standards over the operation of the name space), others reject ICANN's oversight of the DNS as illegitimate, favoring decentralization based upon distributed consensus protocols rather than multistakeholderism. <xref target="MUSIANI"/></t>
      <t>Third, decentralization unavoidably involves adjustments to the power relationships between protocol participants, especially when decentralizing a function opens up the possibility of consolidation elsewhere. As Schneider notes in <xref target="AMBITION"/>, decentralization "appears to operate as a rhetorical strategy that directs attention toward some aspects of a proposed social order and away from others", so "we cannot accept technology as a substitute for taking social, cultural, and political considerations seriously." Or, as more bluntly stated in <xref target="PERSPECTIVE"/>, "without governance mechanisms in place, nodes may collude, people may lie to each other, markets can be rigged, and there can be significant cost to people entering and exiting markets."</t>
      <t>For example, while blockchain-based cryptocurrencies might address the consolidation inherent in traditional currencies through technical means, the concentration of power that many exhibit in terms of voting/mining power, distribution of funds, and diversity of codebase causes some to question how decentralized they actually are. <xref target="AREWEDECENTRALIZEDYET"/> The lack of formal structures brings an opportunity for latent, informal power structures that have their own risks -- including consolidation. <xref target="STRUCTURELESS"/></t>
      <t>In practice, this means that decentralizing a function requires considerable work, is inherently political, and involves a large degree of uncertainty about the outcome. In particular, if one considers decentralization as a larger social goal (in the spirit of how the term is used in other, non-computing contexts), merely rearranging technical functions may lead to frustration. "A distributed network does not automatically yield an egalitarian, equitable or just social, economic, political landscape." <xref target="PERSPECTIVE"/></t>
      <section anchor="techniques">
        <name>Decentralization Techniques</name>
        <t>In the context of Internet standardization, decentralization is a two-step process: first assessing the nature of consolidation risk, followed by the application of techniques to reduce or mitigate it. The subsections below examine some of these techniques.</t>
        <t>Choosing the appropriate techniques for decentralization requires balancing the specific goals of the function against consolidation risk, because completely precluding all forms of consolidation through technical means is rarely achievable. When performed properly, decentralization might produce an outcome that still has consolidation risk, but that risk should be understood, acceptable, and, where possible and appropriate, mitigated.</t>
        <t>Notably, decentralization does not require that provision of a function need be distributed in a particular fashion, or to a particular degree. For example, the Domain Name System <xref target="RFC1035"/> is widely agreed to have acceptable consolidation risk, despite it being provided by a limited set of entities.</t>
        <section anchor="federation">
          <name>Federation</name>
          <t>A widely known technique for managing consolidation in Internet protocols is federation -- designing them in such a way that new instances of a function are easy to create and can maintain interoperability and connectivity with other instances.</t>
          <t>For example, SMTP <xref target="RFC5321"/> is the basis of the e-mail suite of protocols, which has two functions that have consolidation risk:</t>
          <ol spacing="normal" type="1"><li>Giving each user a globally unique address, and</li>
            <li>Routing messages to the user, even when they change network locations or become disconnected for long periods of time.</li>
          </ol>
          <t>E-mail reuses DNS to help mitigate the first risk. To mitigate the second, it defines a specific role for routing users' messages, the Message Transfer Agent (MTA). By allowing anyone to deploy an MTA and defining rules for interconnecting them, the protocol's users avoid a requirement for a single central router.</t>
          <t>Users can (and often do) choose to delegate that role to someone else, or run their own MTA. However, running your own mail server has become difficult, because of the likelihood of a small MTA being classified as a spam source. Because large MTA operators are widely known and have greater impact if their operation is affected, they are less likely to be classified as such, concentrating the protocol's operation (see <xref target="indirect"/>).</t>
          <t>Another example of a federated Internet protocol is XMPP <xref target="RFC6120"/>, supporting "instant messaging" and similar functionality. Like e-mail, it reuses DNS for naming and requires federation to facilitate rendezvous of users from different systems.</t>
          <t>While some deployments of XMPP do support truly federated messaging (i.e., a person using service A can interoperably chat with someone using service B), many of the largest do not. Because federation is voluntary, some operators captured their users into a single service, denying them the benefits of global interoperability.</t>
          <t>The examples above illustrate that, while federation can be a useful technique to avoid proprietary centralization and manage beneficial centralization, it does not prevent concentration or platform centralization. If a single entity can capture the value provided by a protocol, it may use the protocol as a platform to get a "winner take all" outcome -- a significant risk with many Internet protocols, since network effects often promote such outcomes. Likewise, external factors (such as spam control) might naturally "tilt the table" towards a few operators.</t>
        </section>
        <section anchor="multi">
          <name>Multi-Stakeholder Governance</name>
          <t>Protocol designers sometime mitigate the consolidation risks associated with a beneficial centralized function (see <xref target="necessary"/>) by delegating that function's governance to a multi-stakeholder body -- an institution that includes representatives of the different kinds of parties that are affected by the system's operation ("stakeholders") in an attempt to make well-reasoned, legitimate, and authoritative decisions.</t>
          <t>The most widely studied example of this technique is the governance of the DNS name space, which as a "single source of truth" exhibits beneficial centralization. The associated risk is mitigated through administration by <eref target="https://www.icann.org/resources/pages/governance/governance-en">the Internet Corporation for Assigned Names and Numbers (ICANN)</eref>, a global multi-stakeholder body with representation from end users, governments, operators, and others.</t>
          <t>Another example is the governance of the Web's trust model, implemented by Web browsers as relying parties and Certificate Authorities as trust anchors. To ensure that all parties meet the operational and security requirements necessary to provide the desired properties, the <eref target="https://cabforum.org">CA/Browser Forum</eref> was established as an oversight body that involves both parties as stakeholders.</t>
          <t>Yet another example of multi-stakeholderism is the standardization of Internet protocols themselves. Because a specification controls implementation behavior, the standardization process can be seen as a single point of control. As a result, Internet standards bodies like the IETF allow open participation and contribution, make decisions in an open and accountable way, have a well-defined process for making (and when necessary, appealing) decisions, considering the views of different stakeholder groups <xref target="RFC8890"/>.</t>
          <t>A major downside of this approach is that setup and ongoing operation of multi-stakeholder bodies is not trivial. Additionally, their legitimacy cannot be assumed, and may be difficult to establish and maintain (see, e.g., <xref target="MULTISTAKEHOLDER"/>). This concern is especially relevant if the function being coordinated is broad, complex, and/or contentious.</t>
        </section>
        <section anchor="distributed">
          <name>Distributed Consensus</name>
          <t>Increasingly, distributed consensus technologies (such as the blockchain) are touted as a solution to consolidation issues. A complete survey of this rapidly changing area is beyond the scope of this document, but we can generalize about its properties.</t>
          <t>These techniques attempt to avoid consolidation risk by distributing functions to members of a sometimes large pool of protocol participants. They typically guarantee proper performance of a function using cryptographic techniques (often, an append-only transaction ledger). A particular task's assignment to a node for handling usually cannot be predicted or controlled.</t>
          <t>Sybil attacks (where a party or coordinated parties cheaply create enough protocol participants to affect how consensus is judged) are a major concern for these protocols. They encourage diversity in the pool of participants using indirect techniques, such as proof-of-work (where each participant has to show significant consumption of resources) or proof-of-stake (where each participant has some other incentive to execute correctly).</t>
          <t>Use of these techniques can create barriers to proprietary and inherited centralization. However, depending upon the application in question, both concentration and platform centralization are still possible.</t>
          <t>It is also important to recognize that a protocol or an application can use distributed consensus for some functions, but still have consolidation risk elsewhere -- either because those functions cannot be decentralized (most commonly, rendezvous and global naming; see <xref target="necessary"/>) or because the designer has chosen not to because of the associated costs and lost opportunities.</t>
          <t>Even when distributed consensus is used for all technical functions of a service, some coordination is still necessary -- whether that be through governance of the function itself, creation of shared implementations, or documentation of shared wire protocols. That represents consolidation risk, just at a different layer (inherited or platform).</t>
          <t>These potential shortcomings do not rule out the use of distributed consensus technologies in every instance. They do, however, caution against uncritically relying upon these technologies to avoid consolidation.</t>
        </section>
      </section>
    </section>
    <section anchor="considerations">
      <name>What Should Internet Standards Do?</name>
      <t>Centralization is driven by powerful forces -- both economic and social -- as well as the network effects that come with Internet scale. Bodies like the IETF create voluntary standards; they cannot require adoption, but when a specification succeeds, it creates those very network effects. As such, standards bodies cannot prevent all forms of consolidation, but they can still take meaningful steps to prevent some of them. The subsections below suggest a few.</t>
      <section anchor="legitimate">
        <name>Bolster Legitimacy</name>
        <t>As discussed, many efforts to address Internet consolidation are likely to take place outside of standards bodies. If the IETF wishes to contribute to these efforts to assure their compatibility with the Internet's architectural goals, it must be seen as legitimate by the relevant parties -- especially, by competition regulators. Alternatively, if the IETF is perceived as representing or being controlled by "big tech" concerns, its ability to guide decisions that affect the Internet are diminished considerably.</t>
        <t>The IETF already has features that arguably provide considerable legitimacy; for example, open participation and representation by individuals rather than companies both enhance input legitimacy; a well-defined process with multiple layers of appeals and transparency contribute to throughput legitimacy, and a long history of successful Internet standards provide perhaps the strongest source of legitimacy for the IETF -- its output.</t>
        <t>However, it is also widely recognized the considerable costs (in time and money) involved in successfully participating in the IETF have a tendency of favouring larger companies over smaller concerns. Likewise, the specialised and highly technical nature of the work creates barriers to entry for non-technical stakeholders. These factors have the potential to reduce the legitimacy of the IETF's decisions, at least in some eyes.</t>
        <t>Efforts to address these shortcomings are ongoing; see, for example, <xref target="RFC8890"/>. Overall, bolstering the legitimacy of the organization should be seen as a continuous effort, with a focus on all of the aspects listed.</t>
      </section>
      <section anchor="target">
        <name>Engage with Consolidation Risk Thoroughly but Realistically</name>
        <t>Some consolidation risks are easy to manage in standards efforts. For example, if a proprietary protocol were to be proposed to the IETF, it would be rejected out of hand. There is a growing body of knowledge and experience in managing the risk of beneficial centralization, and a strong inclination to reuse existing infrastructure where possible. As discussed above, encryption is often a way to manage inherited centralization, and has become the norm in standard protocols. These responses are appropriate ways for Internet standards to manage consolidation risk.</t>
        <t>However, mitigating concentration and platform centralization is much more difficult in standards efforts. Because the IETF has no "protocol police", it's not possible to demand that someone stop building a proprietary service using a federated protocol (for example). The standards process also cannot stop someone from building services "on top" of standard protocols without abandoning architectural goals like permissionless innovation. While the imprimatur of an Internet Standard is not without value, merely withholding it cannot prevent these sources of consolidation.</t>
        <t>Therefore, committing significant resources to scrutinizing protocols for latent consolidation risk -- especially for concentration and platform risks -- is unlikely to be effective in preventing Internet consolidation. Almost all existing Internet protocols -- including IP, TCP, HTTP, and DNS -- exhibit concentration or platform centralization. Refusing to standardize a newer protocol because it faces similar risks would not be equitable, proportionate, or effective.</t>
        <t>When claims are made that a given proposal is "centralized" or "decentralized", the context of those statements should be examined for presuppositions, assumptions, and omissions. <xref target="BACCHI"/> offers one framework for such critical interrogations. <xref target="SCHNEIDER"/> implores that proposals to decentralize be "really, really clear about what particular features of a system a given design seeks to decentralize" and promotes borrowing remedies from more traditional governance systems, such as separation of powers and accountability.</t>
        <t>When consolidation risk is found, standards efforts should consider its relationship with other architectural goals as they consider how to address it. In particular, attention should be paid to how effective standards (as a form of architectural control) is in achieving each goal.</t>
        <t>For example, privacy is often more effectively ensured by ex ante technical constraints, as compared to ex post legal regulation. Conversely (as discussed) some consolidation risks may be more effectively addressed through legal regulation. Thus, as a first order concern, a standards effort balancing these concerns might focus primarily on privacy. However, often these are not completely separable goals -- concentration can result in one or a few entities having greater volume and variety of data available exclusively to them, raising significant privacy and security concerns.</t>
      </section>
      <section anchor="up">
        <name>Decentralize Proprietary Functions</name>
        <t>It is worthwhile to create specifications for functions that are currently only available through proprietary providers. By establishing open standards, an alternative to a consolidated function can be created.</t>
        <t>Such efforts might include large-scale protocols for existing proprietary functions (e.g., chat) as well as smaller efforts to improve interoperability and portability of specific features that are often used to "lock in" users to a platform; for example, a format for lists of contacts in a social network.</t>
        <t>A common objection to this approach is that adoption is voluntary, not mandatory; there are no "standards police" to mandate their use or enforce correct implementation. For example, specifications like <xref target="ACTIVITYSTREAMS"/>) have been available for some time without being used in a federated manner by commercial social networking providers.</t>
        <t>However, while standards aren't mandatory, legal regulation is, and regulators around the globe are focusing specific efforts on some aspects of the Internet. In particular, legal mandates for interoperability are increasingly discussed as a remedy for competition issues (see, e.g., <xref target="OECD"/>).</t>
        <t>As such, appetite for regulation presents an opportunity for new specifications to decentralize these functions, backed by a legal mandate in combination with changing norms and the resulting market forces <xref target="NEW-CHICAGO"/>. That opportunity also presents a risk, however, if the resulting legal regulation is at odds with the Internet architecture.</t>
        <t>Successfully creating standards that work in concert with legal regulation is new ground for the IETF, presents many potential pitfalls, and will require new capabilities (especially liaison, likely originating in the IAB) and considerable effort. If the Internet community does not make that effort, it is likely that regulators will turn to other sources of interoperability specifications -- most likely, with less transparency, more narrow input, limited experience, and without reference to the Internet's architectural goals.</t>
      </section>
      <section anchor="new">
        <name>Evaluate New Decentralization Techniques</name>
        <t>The decentralization techniques listed in <xref target="techniques"/> are not a closed set; wide interest has spurred development of new approaches, both in general and as solutions to specific problems.</t>
        <t>For example, secure multi-party computation techniques (see, e.g., <xref target="YAO"/>) can be composed to allow parties to compute over private inputs without revealing them. Protocols like <xref target="ENPA"/> and <xref target="PRIO"/> use them to limit the information available to participants in protocols to realize privacy goals; as discussed in <xref target="intermediation"/> doing so might also counteract some sources of centralization. However, as in other cases these techniques do not automatically preclude all consolidation; such systems often still require trust, even if it is limited, and that might result in other forms of consolidation emerging.</t>
        <t>Whether use of these techniques (or others) can meaningfully counteract consolidation is still uncertain. Standards bodies (including the IETF) can serve an important function by incubating them, applying (and, where necessary, developing) architectural guidelines for privacy, security, operability, and other goals, and assuring interoperability. When appropriate, publication on the standards track or as experimental can send signals to implementers, users, and regulators about their fitness for particular purposes.</t>
      </section>
      <section anchor="balance">
        <name>Enable Switching</name>
        <t>To minimize consolidation risk, standards-defined functions should have an explicit goal enabling users' switching between implementations and deployments of protocols.</t>
        <t>One necessary condition for this is the availability of alternatives; breadth and diversity of implementation and deployment are required. <xref section="2.1" sectionFormat="of" target="RFC5218"/> explores some factors in protocol design that encourage this outcome.</t>
        <t>Another factor is the cost of substituting an alternative implementation or deployment by users. This implies that the standard needs to be functionally complete and specified precisely enough to allow substitution.</t>
        <t>The goals of completeness and diversity are sometimes in tension. If a standard becomes extremely complex to assure easy switching, it may discourage implementation diversity because the cost of a complete implementation is too high (consider: Web browsers). On the other hand, if the specification is too simple, it may not enable easy switching, especially if proprietary extensions are necessary to complete it (see <xref target="evolution"/>).</t>
        <t>One objection to protocols that enable easy switching is that they reduce the incentives for implementation by commercial vendors. While a completely commoditized protocol might not allow implementations to differentiate themselves, they provide opportunities for specialization and improvement elsewhere in the value chain <xref target="ATTRACTIVE-PROFITS"/>. Well-timed standards efforts leverage these forces to focus proprietary interests on top of open technology, rather than as a replacement for it.</t>
      </section>
      <section anchor="intermediation">
        <name>Control Delegation of Power</name>
        <t>Some functions might see substantial benefits if they are performed by a third party in communication. When used well, adding a new party to communication can improve:</t>
        <ul spacing="normal">
          <li>
            <em>Efficiency</em>: Many functions on the Internet are more efficient when performed at a higher scale. For example, a content delivery network can offer services at a fraction of the financial and environmental cost that someone serving content themselves would otherwise pay, because of the scale they operate at. Likewise, a two-sided market platform can introduce sizeable efficiencies over pair-wise buyer/seller trading <xref target="CIRCULAR-CONUNDRUM"/>.</li>
          <li>
            <em>Simplicity</em>: Completely disintermediating communication can shift the burden of functions onto endpoints. This can cause increased cognitive load for users; for example, compare commercial social networking platforms with self-hosted efforts.</li>
          <li>
            <em>Specialization</em>: Having a function concentrated into a few hands can improve outcomes because of the resulting specialization. For example, services overseen by professional administrators are often seen to have a better security posture and improved availability.</li>
          <li>
            <em>Privacy</em>: For some functions, user privacy can be improved by concentrating their activity to prevent individual behaviors from being discriminated from each other.<xref target="MIX"/> Introduction of a third party can also enforce functional boundaries -- for example, to reduce the need for users to trust potentially malicious endpoints, as seen in the so-called "oblivious" protocols (e.g., <xref target="RFC9230"/>) that allow end users to hide their identity from services, while still accessing them.</li>
        </ul>
        <t>However, introducing a new party to communication adds concentration and platform centralization risk to Internet functions, because it brings opportunities for control and observation. While (as discussed above) standards efforts have a very limited capability to prevent or control the resulting consolidation, designing functions with thoughtful constraints on third party functions can prevent at least the most egregious outcomes.</t>
        <t>Most often, third parties are added to functions as "intermediaries" or in designated "agent" roles. In general, they should only be interposed because of the positive action of at least one of the primary parties, and should have their ability to observe or control communication limited to what is necessary to perform their intended function.</t>
        <t>For example, early deployments of HTTP allowed intermediaries to be interposed by the network without knowledge of the endpoints, and those intermediaries could see and change the full content of traffic by default -- even when they are only intended to perform basic functions such as caching. Because of the introduction of HTTPS and the CONNECT method (see <xref section="9.3.6" sectionFormat="of" target="HTTP"/>), combined with efforts to encourage its adoption, those intermediaries are now required to be explicitly interposed by one endpoint.</t>
        <t>See <xref target="I-D.thomson-tmi"/> for more guidance on protocol intermediation.</t>
        <t>The term "intermediary" is also used (often in legal and regulatory contexts) more broadly than it has been in protocol design; for example, an auction Web site intermediates between buyers and sellers is considered an intermediary, even though it is not formally an intermediary in HTTP (see <xref section="3.7" sectionFormat="of" target="HTTP"/>). Protocol designers can address the consolidation risk associated with this kind of intermediation by standardising the function, rather than restricting the capabilities of the underlying protocols; see <xref target="up"/>.</t>
      </section>
      <section anchor="evolution">
        <name>Consider Extensibility and Modularity Carefully</name>
        <t>An important feature of the Internet is its ability to evolve, so that it can meet new requirements and adapt to new conditions without requiring a "flag day" to upgrade implementations. Typically, functions accommodate evolution by defining extension interfaces, which allow optional features to be added or change over time in an interoperable fashion.</t>
        <t>However, these interfaces can also be a basis for platform centralization if a powerful entity can change the target for meaningful interoperability by adding proprietary extensions to a standard. This is especially true when the core standard does not itself provide sufficient utility on its own.</t>
        <t>For example, the SOAP protocol's <xref target="SOAP"/> extreme flexibility and failure to provide significant standalone value allowed vendors to require use of their preferred extensions, favoring those who had more market power.</t>
        <t>Therefore, standards efforts should focus on providing concrete utility to the majority of their users as published, rather than being a "framework" where interoperability is not immediately available. Internet functions should not make every aspect of their operation extensible; boundaries between modules should be designed in a way that allows evolution and discourages consolidation, while still offering meaningful functionality.</t>
        <t>Beyond allowing evolution, well-considered interfaces can also aid decentralization efforts. The structural boundaries that emerge between the sub-modules of the function -- as well as those with adjacent functions -- provide touchpoints for interoperability and an opportunity for substitution of providers.</t>
        <t>In particular, if the interfaces of a function are well-defined and stable, there is an opportunity to use different providers for that function. When those interfaces are open standards, change control resides with the Internet community instead of remaining in proprietary hands, further enhancing stability and enabling (but not ensuring) decentralization.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document does not have a direct security impact on Internet protocols. However, failure to consider consolidation risks might cause a myriad of security issues.</t>
    </section>
  </middle>
  <back>
    <displayreference target="RAND" to="BARAN"/>
    <displayreference target="SCALE-FREE" to="BARABASI"/>
    <displayreference target="INTERMEDIARY-INFLUENCE" to="JUDGE"/>
    <displayreference target="INTERDEPENDENCE" to="FARRELL"/>
    <displayreference target="MULTISTAKEHOLDER" to="PALLADINO"/>
    <displayreference target="NEW-CHICAGO" to="LESSIG"/>
    <displayreference target="POLYCENTRIC" to="ALIGIA"/>
    <displayreference target="PIR" to="OLUMOFIN"/>
    <displayreference target="ACCESS" to="ABRAHAMSON"/>
    <displayreference target="SUCCESS" to="KENDE"/>
    <displayreference target="MIX" to="CHAUM"/>
    <displayreference target="FEDERALIST-51" to="MADISON"/>
    <displayreference target="ATTRACTIVE-PROFITS" to="CHRISTENSEN"/>
    <displayreference target="CIRCULAR-CONUNDRUM" to="SPULBER"/>
    <displayreference target="AMBITION" to="SCHNEIDERb"/>
    <displayreference target="PERSPECTIVE" to="BODO"/>
    <displayreference target="STRUCTURELESS" to="FREEMAN"/>
    <displayreference target="SCHNEIDER" to="SCHNEIDERa"/>
    <references>
      <name>Informative References</name>
      <reference anchor="RAND" target="https://www.rand.org/pubs/research_memoranda/RM3420.html">
        <front>
          <title>On Distributed Communications: Introduction to Distributed Communications Networks</title>
          <author initials="P." surname="Baran" fullname="Paul Baran">
            <organization>RAND Corporation</organization>
          </author>
          <date year="1964"/>
        </front>
      </reference>
      <reference anchor="HTTP">
        <front>
          <title>HTTP Semantics</title>
          <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding">
            <organization/>
          </author>
          <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham">
            <organization/>
          </author>
          <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke">
            <organization/>
          </author>
          <date month="June" year="2022"/>
          <abstract>
            <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes. </t>
            <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="97"/>
        <seriesInfo name="RFC" value="9110"/>
        <seriesInfo name="DOI" value="10.17487/RFC9110"/>
      </reference>
      <reference anchor="SOAP" target="https://www.w3.org/TR/2007/REC-soap12-part0-20070427/">
        <front>
          <title>SOAP Version 1.2 Part 0: Primer (Second Edition)</title>
          <author fullname="Nilo Mitra" role="editor"/>
          <author fullname="Yves Lafon" role="editor"/>
          <date day="27" month="April" year="2007"/>
        </front>
        <seriesInfo name="W3C REC" value="REC-soap12-part0-20070427"/>
        <seriesInfo name="W3C" value="REC-soap12-part0-20070427"/>
      </reference>
      <reference anchor="SCALE-FREE" target="https://barabasi.com/f/67.pdf">
        <front>
          <title>Emergence of Scaling in Random Networks</title>
          <author initials="R." surname="Albert" fullname="Réka Albert">
            <organization>University of Notre Dame</organization>
          </author>
          <date year="1999" month="October"/>
        </front>
        <refcontent>SCIENCE, Vol. 286, No. 15, p. 509</refcontent>
      </reference>
      <reference anchor="INTERMEDIARY-INFLUENCE" target="https://scholarship.law.columbia.edu/faculty_scholarship/1856">
        <front>
          <title>Intermediary Influence</title>
          <author initials="K." surname="Judge" fullname="Kathryn Judge">
            <organization>Columbia Law School</organization>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>University of Chicago Law Review, Vol. 82, p. 573</refcontent>
      </reference>
      <reference anchor="INTERDEPENDENCE" target="https://doi.org/10.1162/ISEC_a_00351">
        <front>
          <title>Weaponized Interdependence: How Global Economic Networks Shape State Coercion</title>
          <author initials="H." surname="Farrell" fullname="Henry Farrell">
            <organization>George Washington University</organization>
          </author>
          <author initials="A. L." surname="Newman" fullname="Abraham L. Newman">
            <organization>Georgetown University</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>International Security, Vol. 44, No. 1, p. 42</refcontent>
      </reference>
      <reference anchor="MOXIE" target="https://signal.org/blog/the-ecosystem-is-moving/">
        <front>
          <title>Reflections: The ecosystem is moving</title>
          <author initials="M." surname="Marlinspike" fullname="Moxie Marlinspike">
            <organization>Signal</organization>
          </author>
          <date year="2016" month="May"/>
        </front>
      </reference>
      <reference anchor="MULTISTAKEHOLDER" target="https://link.springer.com/book/10.1007/978-3-030-56131-4">
        <front>
          <title>Legitimacy, Power, and Inequalities in the Multistakeholder Internet Governance</title>
          <author initials="N." surname="Palladino" fullname="Nicola Palladino">
            <organization/>
          </author>
          <author initials="N." surname="Santaniello" fullname="Nauro Santaniello">
            <organization/>
          </author>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="NEW-CHICAGO" target="https://www.journals.uchicago.edu/doi/10.1086/468039">
        <front>
          <title>The New Chicago School</title>
          <author initials="L." surname="Lessig" fullname="Laurence Lessig">
            <organization/>
          </author>
          <date year="1998" month="June"/>
        </front>
        <refcontent>Journal of Legal Studies, Vol. 27</refcontent>
      </reference>
      <reference anchor="POLYCENTRIC" target="https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1468-0491.2011.01550.x">
        <front>
          <title>Polycentricity: From Polanyi to Ostrom, and Beyond</title>
          <author initials="P. D." surname="Aligia" fullname="Paul D. Aligia">
            <organization/>
          </author>
          <author initials="V." surname="Tarko" fullname="Vlad Tarko">
            <organization/>
          </author>
          <date year="2012" month="April"/>
        </front>
        <refcontent>Governance: An International Journal of Policy, Administration, and Institutions, Vol. 25, No. 2, p. 237</refcontent>
      </reference>
      <reference anchor="PIR" target="https://link.springer.com/chapter/10.1007/978-3-642-27576-0_13">
        <front>
          <title>Revisiting the Computational Practicality of Private Information Retrieval</title>
          <author initials="F." surname="Olumofin" fullname="Femi Olumofin">
            <organization/>
          </author>
          <author initials="I." surname="Goldberg" fullname="Ian Goldberg">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
      </reference>
      <reference anchor="ACCESS" target="https://www.yalelawjournal.org/comment/essential-data">
        <front>
          <title>Essential Data</title>
          <author initials="Z." surname="Abrahamson" fullname="Zachary Abrahamson">
            <organization/>
          </author>
          <date year="2014"/>
        </front>
        <refcontent>Yale Law Journal, Vol. 124, No. 3</refcontent>
      </reference>
      <reference anchor="SUCCESS" target="https://blog.apnic.net/wp-content/uploads/2021/12/MKGRA669-Report-for-APNIC-LACNIC-V3.pdf">
        <front>
          <title>Study on the Internet's Technical Success Factors</title>
          <author initials="M." surname="Kende" fullname="Michael Kende">
            <organization/>
          </author>
          <author initials="A." surname="Kvalbein" fullname="Amund Kvalbein">
            <organization/>
          </author>
          <author initials="J." surname="Allford" fullname="Julia Allford">
            <organization/>
          </author>
          <author initials="D." surname="Abecassis" fullname="David Abecassis">
            <organization/>
          </author>
          <date year="2021" month="December"/>
        </front>
      </reference>
      <reference anchor="OECD" target="https://www.oecd.org/daf/competition/data-portability-interoperability-and-digital-platform-competition-2021.pdf">
        <front>
          <title>Data portability, interoperability and digital platform competition</title>
          <author>
            <organization>OECD</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
      </reference>
      <reference anchor="MIX" target="https://dl.acm.org/doi/10.1145/358549.358563">
        <front>
          <title>Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms</title>
          <author initials="D. L." surname="Chaum" fullname="David L. Chaum">
            <organization/>
          </author>
          <date year="1981" month="February"/>
        </front>
        <refcontent>Communications of the ACM, Vol. 24, No. 2</refcontent>
      </reference>
      <reference anchor="FEDERALIST-51">
        <front>
          <title>The Structure of the Government Must Furnish the Proper Checks and Balances Between the Different Departments</title>
          <author initials="J." surname="Madison" fullname="James Madison">
            <organization/>
          </author>
          <date year="1788" month="February"/>
        </front>
        <refcontent>The Federalist Papers, No. 51</refcontent>
      </reference>
      <reference anchor="ATTRACTIVE-PROFITS">
        <front>
          <title>The Law of Conservation of Attractive Profits</title>
          <author initials="C." surname="Christensen" fullname="Clayton Christensen">
            <organization/>
          </author>
          <date year="2004" month="February"/>
        </front>
        <refcontent>Harvard Business Review, "Breakthrough Ideas for 2004"</refcontent>
      </reference>
      <reference anchor="ACTIVITYSTREAMS" target="https://www.w3.org/TR/2016/CR-activitystreams-core-20161215/">
        <front>
          <title>Activity Streams 2.0</title>
          <author fullname="Evan Prodromou" role="editor"/>
          <author fullname="James Snell" role="editor"/>
          <date day="15" month="December" year="2016"/>
        </front>
        <seriesInfo name="W3C CR" value="CR-activitystreams-core-20161215"/>
        <seriesInfo name="W3C" value="CR-activitystreams-core-20161215"/>
      </reference>
      <reference anchor="CIRCULAR-CONUNDRUM" target="https://wwws.law.northwestern.edu/research-faculty/clbe/workingpapers/documents/spulber_circularconundrum.pdf">
        <front>
          <title>Solving The Circular Conundrum: Communication And Coordination In Internet Markets</title>
          <author initials="D. F." surname="Spulber" fullname="Daniel F. Spulber">
            <organization/>
          </author>
          <date year="2010"/>
        </front>
        <refcontent>Northwestern University Law Review, Vol. 104, No. 2</refcontent>
      </reference>
      <reference anchor="YAO" target="https://dl.acm.org/doi/10.5555/1382436.1382751">
        <front>
          <title>Protocols for secure computations</title>
          <author initials="A. C." surname="Yao" fullname="Andrew C. Yao">
            <organization/>
          </author>
          <date year="1982" month="November"/>
        </front>
        <refcontent>SFCS '82</refcontent>
      </reference>
      <reference anchor="ENPA" target="https://covid19-static.cdn-apple.com/applications/covid19/current/static/contact-tracing/pdf/ENPA_White_Paper.pdf">
        <front>
          <title>Exposure Notification Privacy-preserving Analytics (ENPA) White Paper</title>
          <author>
            <organization>Apple</organization>
          </author>
          <author>
            <organization>Google</organization>
          </author>
          <date year="2021" month="April"/>
        </front>
      </reference>
      <reference anchor="PRIO" target="https://crypto.stanford.edu/prio/paper.pdf">
        <front>
          <title>Prio: Private, Robust, and Scalable Computation of Aggregate Statistics</title>
          <author initials="H." surname="Corrigan-Gibbs" fullname="Henry Corrigan-Gibbs">
            <organization/>
          </author>
          <author initials="D." surname="Boneh" fullname="Dan Boneh">
            <organization/>
          </author>
          <date year="2017" month="March"/>
        </front>
      </reference>
      <reference anchor="AMBITION" target="https://osf.io/m7wyj/">
        <front>
          <title>Decentralization: an incomplete ambition</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>Journal of Cultural Economy, Vol. 12, No. 4</refcontent>
      </reference>
      <reference anchor="AREWEDECENTRALIZEDYET" target="https://bitcoinera.app/arewedecentralizedyet/">
        <front>
          <title>Are We Decentralized Yet?</title>
          <author>
            <organization>bitcoinera</organization>
          </author>
          <date year="2022"/>
        </front>
      </reference>
      <reference anchor="PERSPECTIVE" target="https://doi.org/10.14763/2021.2.1563">
        <front>
          <title>Decentralization: a multidisciplinary perspective</title>
          <author initials="B." surname="Bodó" fullname="Balázs Bodó">
            <organization>University of Amsterdam</organization>
          </author>
          <author initials="J. K." surname="Brekke" fullname="Jaya Klara Brekke">
            <organization>Durham University</organization>
          </author>
          <author initials="J.-H." surname="Hoepman" fullname="Jaap-Henk Hoepman">
            <organization>Radboud University</organization>
          </author>
          <date year="2021" month="June"/>
        </front>
        <refcontent>Internet Policy Review, Vol. 10, No. 2</refcontent>
      </reference>
      <reference anchor="MUSIANI" target="https://link.springer.com/chapter/10.1057/9781137483591_4">
        <front>
          <title>Alternative Technologies as Alternative Institutions: The Case of the Domain Name System</title>
          <author initials="F." surname="Musiani" fullname="Francesca Musiani">
            <organization/>
          </author>
          <date year="2016"/>
        </front>
        <refcontent>The Turn to Infrastructure in Internet Governance</refcontent>
      </reference>
      <reference anchor="STRUCTURELESS" target="https://www.jstor.org/stable/41035187">
        <front>
          <title>The Tyranny of Structurelessness</title>
          <author initials="J." surname="Freeman" fullname="Jo Freeman">
            <organization/>
          </author>
          <date year="1972"/>
        </front>
        <refcontent>Berkeley Journal of Sociology, Vol. 17</refcontent>
      </reference>
      <reference anchor="ISOC" target="https://future.internetsociety.org/2019/">
        <front>
          <title>Consolidation in the Internet Economy</title>
          <author>
            <organization>Internet Society</organization>
          </author>
          <date year="2019"/>
        </front>
        <refcontent>Internet Society Global Internet Report</refcontent>
      </reference>
      <reference anchor="ECH">
        <front>
          <title>TLS Encrypted Client Hello</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>RTFM, Inc.</organization>
          </author>
          <author fullname="Kazuho Oku" initials="K." surname="Oku">
            <organization>Fastly</organization>
          </author>
          <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
            <organization>Cloudflare</organization>
          </author>
          <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="3" month="October" year="2022"/>
          <abstract>
            <t>   This document describes a mechanism in Transport Layer Security (TLS)
   for encrypting a ClientHello message under a server public key.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tlswg/draft-ietf-tls-esni
   (https://github.com/tlswg/draft-ietf-tls-esni).

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-esni-15"/>
      </reference>
      <reference anchor="SCHNEIDER" target="https://nathanschneider.info/articles/DecentralHacker.html">
        <front>
          <title>What to do once you admit that decentralizing everything never seems to work</title>
          <author initials="N." surname="Schneider" fullname="Nathan Schneider">
            <organization/>
          </author>
          <date year="2022" month="October"/>
        </front>
        <refcontent>Hacker Noon</refcontent>
      </reference>
      <reference anchor="BACCHI" target="https://library.oapen.org/bitstream/handle/20.500.12657/33181/560097.pdf?sequence=1#page=34">
        <front>
          <title>Introducing the ‘What’s the Problem Represented to be?’ approach</title>
          <author initials="C." surname="Bacchi" fullname="Carol Bacchi">
            <organization/>
          </author>
          <date year="2012"/>
        </front>
        <refcontent>Chapter 2, Engaging with Carol Bacchi</refcontent>
      </reference>
      <reference anchor="RFC791">
        <front>
          <title>Internet Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="STD" value="5"/>
        <seriesInfo name="RFC" value="791"/>
        <seriesInfo name="DOI" value="10.17487/RFC0791"/>
      </reference>
      <reference anchor="RFC4271">
        <front>
          <title>A Border Gateway Protocol 4 (BGP-4)</title>
          <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter">
            <organization/>
          </author>
          <author fullname="T. Li" initials="T." role="editor" surname="Li">
            <organization/>
          </author>
          <author fullname="S. Hares" initials="S." role="editor" surname="Hares">
            <organization/>
          </author>
          <date month="January" year="2006"/>
          <abstract>
            <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
            <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems.  This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
            <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR).  These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP.  BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
            <t>This document obsoletes RFC 1771.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4271"/>
        <seriesInfo name="DOI" value="10.17487/RFC4271"/>
      </reference>
      <reference anchor="RFC793">
        <front>
          <title>Transmission Control Protocol</title>
          <author fullname="J. Postel" initials="J." surname="Postel">
            <organization/>
          </author>
          <date month="September" year="1981"/>
        </front>
        <seriesInfo name="RFC" value="793"/>
        <seriesInfo name="DOI" value="10.17487/RFC0793"/>
      </reference>
      <referencegroup anchor="BCP95" target="https://www.rfc-editor.org/info/bcp95">
        <reference anchor="RFC3935" target="https://www.rfc-editor.org/info/rfc3935">
          <front>
            <title>A Mission Statement for the IETF</title>
            <author fullname="H. Alvestrand" initials="H." surname="Alvestrand"/>
            <date month="October" year="2004"/>
            <abstract>
              <t>This memo gives a mission statement for the IETF, tries to define the terms used in the statement sufficiently to make the mission statement understandable and useful, argues why the IETF needs a mission statement, and tries to capture some of the debate that led to this point.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="95"/>
          <seriesInfo name="RFC" value="3935"/>
          <seriesInfo name="DOI" value="10.17487/RFC3935"/>
        </reference>
      </referencegroup>
      <reference anchor="RFC7258">
        <front>
          <title>Pervasive Monitoring Is an Attack</title>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
            <organization/>
          </author>
          <date month="May" year="2014"/>
          <abstract>
            <t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="188"/>
        <seriesInfo name="RFC" value="7258"/>
        <seriesInfo name="DOI" value="10.17487/RFC7258"/>
      </reference>
      <reference anchor="RFC1035">
        <front>
          <title>Domain names - implementation and specification</title>
          <author fullname="P. Mockapetris" initials="P." surname="Mockapetris">
            <organization/>
          </author>
          <date month="November" year="1987"/>
          <abstract>
            <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System.  It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
          </abstract>
        </front>
        <seriesInfo name="STD" value="13"/>
        <seriesInfo name="RFC" value="1035"/>
        <seriesInfo name="DOI" value="10.17487/RFC1035"/>
      </reference>
      <reference anchor="RFC5321">
        <front>
          <title>Simple Mail Transfer Protocol</title>
          <author fullname="J. Klensin" initials="J." surname="Klensin">
            <organization/>
          </author>
          <date month="October" year="2008"/>
          <abstract>
            <t>This document is a specification of the basic protocol for Internet electronic mail transport.  It consolidates, updates, and clarifies several previous documents, making all or parts of most of them obsolete.  It covers the SMTP extension mechanisms and best practices for the contemporary Internet, but does not provide details about particular extensions.  Although SMTP was designed as a mail transport and delivery protocol, this specification also contains information that is important to its use as a "mail submission" protocol for "split-UA" (User Agent) mail reading systems and mobile environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5321"/>
        <seriesInfo name="DOI" value="10.17487/RFC5321"/>
      </reference>
      <reference anchor="RFC6120">
        <front>
          <title>Extensible Messaging and Presence Protocol (XMPP): Core</title>
          <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
            <organization/>
          </author>
          <date month="March" year="2011"/>
          <abstract>
            <t>The Extensible Messaging and Presence Protocol (XMPP) is an application profile of the Extensible Markup Language (XML) that enables the near-real-time exchange of structured yet extensible data between any two or more network entities.  This document defines XMPP's core protocol methods: setup and teardown of XML streams, channel encryption, authentication, error handling, and communication primitives for messaging, network availability ("presence"), and request-response interactions.  This document obsoletes RFC 3920.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6120"/>
        <seriesInfo name="DOI" value="10.17487/RFC6120"/>
      </reference>
      <reference anchor="RFC8890">
        <front>
          <title>The Internet is for End Users</title>
          <author fullname="M. Nottingham" initials="M." surname="Nottingham">
            <organization/>
          </author>
          <date month="August" year="2020"/>
          <abstract>
            <t>This document explains why the IAB believes that, when there is a conflict between the interests of end users of the Internet and other parties, IETF decisions should favor end users. It also explores how the IETF can more effectively achieve this.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8890"/>
        <seriesInfo name="DOI" value="10.17487/RFC8890"/>
      </reference>
      <reference anchor="RFC5218">
        <front>
          <title>What Makes for a Successful Protocol?</title>
          <author fullname="D. Thaler" initials="D." surname="Thaler">
            <organization/>
          </author>
          <author fullname="B. Aboba" initials="B." surname="Aboba">
            <organization/>
          </author>
          <date month="July" year="2008"/>
          <abstract>
            <t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo  provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5218"/>
        <seriesInfo name="DOI" value="10.17487/RFC5218"/>
      </reference>
      <reference anchor="RFC9230">
        <front>
          <title>Oblivious DNS over HTTPS</title>
          <author fullname="E. Kinnear" initials="E." surname="Kinnear">
            <organization/>
          </author>
          <author fullname="P. McManus" initials="P." surname="McManus">
            <organization/>
          </author>
          <author fullname="T. Pauly" initials="T." surname="Pauly">
            <organization/>
          </author>
          <author fullname="T. Verma" initials="T." surname="Verma">
            <organization/>
          </author>
          <author fullname="C.A. Wood" initials="C.A." surname="Wood">
            <organization/>
          </author>
          <date month="June" year="2022"/>
          <abstract>
            <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.</t>
            <t>This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9230"/>
        <seriesInfo name="DOI" value="10.17487/RFC9230"/>
      </reference>
      <reference anchor="I-D.thomson-tmi">
        <front>
          <title>Principles for the Involvement of Intermediaries in Internet Protocols</title>
          <author fullname="Martin Thomson" initials="M." surname="Thomson">
            <organization>Mozilla</organization>
          </author>
          <date day="8" month="September" year="2022"/>
          <abstract>
            <t>   This document proposes a set of principles for designing protocols
   with rules for intermediaries.  The goal of these principles is to
   limit the ways in which intermediaries can produce undesirable
   effects and to protect the useful functions that intermediaries
   legitimately provide.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-04"/>
      </reference>
    </references>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>This document benefits from discussions with Brian Trammell during our shared time on the Internet Architecture Board.</t>
      <t>Thanks to Jari Arkko, Kristin Berdan, Christian Huitema, Mallory Knodel, Eliot Lear, Tommy Pauly, and Martin Thomson for their comments and suggestions.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA5W9zXIbWZImuudThCEXKY4BoKh/KW2shiKpFDP1ZyTV2Tlt
Y2kB4ICMVACBigiQQslkVvMMs7nXrGdxl3d9H6G38xT1JNf9c/fzExGUqsem
K0USiDjHjx///dx9MpnstUVbuhfZ6Gzdunrt2uy4WjdVWSzytqjWL7LfrvM2
m+fr7KLN14u8XjTZ6XJZ1W2TnVR/Ge3ls1ntbl5kw9/P6Dvhm3uLar7OV/S6
RZ0v28m6attifXWdryb5TVUs6N+TQp8zmbt1W+dl8Tc8aHL/6R49kr765eTo
8vTr3px+uKrq3YusWC+rvb1iU7/I2nrbtA/u339+/8FeXrv8RfazWzt6yt5t
VX+6qqvt5sXeJ7ejnxYvsvQN4fcLd9df5tVa/tT7ddhy+HXtrrZl53dX1Q1t
L6fH7O01TJc/8rJa07Z2rtlrVnnd/vHXbdW65kW2rvY2xYvs39pqPs7of4r1
gt49zhoifu2WDf1rt9J/tHUxpz/Nq9Um13+s6MP0p2JdFmv3P/b2btx6617s
ZdlV0V5vZy+yFZH/4Ht039vLt+11VdMXJ/TdjJ5HS3s7zd75s8Ov5Vjf5vWn
7l+q+ipf69Ne4DebinZeyr+zbJJ9qPPrOl/j53m1pdfTqR7RSfIycvzarfKi
lCX/N/6fKa0Uf9jWRKLrtt00Lw4Obm9vp/bXg729dVWv6LU3tOs9ZhL/U5ad
H707kQUsimZT5vTCl0f0S/yqzesr16aPpfUtprSVg8121hzUrnF5Pb/+Y+VW
Ff8pPzh/+/DRg/vT63ZVykP0Xr1fZycFn89s27oF3Y7Varsu5iBHg2tTV4vt
HJelrb7x2eyda5mLm5GsG5fh8PmTR/jRnxJIqqTVU/mQb8vsZW4k7p4JiEEv
qzeVMnaWvb68/EB/eHX8/PDwPv188f6Ifv7t4fH0/PR40lT55vDBZEPcen9C
1+3p/UcPnvKnjo/enE5enZ+eDtD25dHF2SB5Z7SyWd4UU2Lag+XBk6fTzWIZ
0/B05egbdGWyapldzIkp1lfEh9k5Eb5aebpEZHk/b6uZq4k8z59/gzzg5aMp
aDP7j/+nKVK6HZX0jHbyhv7yt/I//r/+x1IyflwTc9VN0e54nXQLaped0IPs
08rDeTn7b8RLbrH93srOp7qEdFnn//H/fso7f/lPrIQkBsmrlm75Czqws9N3
x6fj7F+qcpo9ePZkTJ+eZoePx9lmmj2+z8Q7e3d5ev729OTs6Pz3ydm7V28+
8lc6B/zLx5OfTwdPt5lfV2VeN9fFZlrmt3TI5XY1K3ImwMEyn2/LdvdH9KGD
w2ePn8SnD8Wycosir3f0w7LcMitEh/3g/uG37oDQ8tdp9st2ceUPQ2n5a95e
17t1528pNY91xdmb/JbY77qqyh4hU4ofX9OlvarwhXN3U7hbpfCzB0LYpw+N
sCenH07fnQxQ9NXR+fnpmzeDNF1UBWTR4f3p4eGTBwdnF6fHf+R/3L//8PFh
Inx+c/mmop2QMAEZF27jWIvM6Y+vq9vs57Ka5WV2SvuoVsXcX6Xs4jrfOFbc
raP9u3pOlBilNP/WxRKav55mr/K6dmXZofprt6az7P4tpfrPjn522W85McX6
qiXpGGg8+Da6x29ILbnbVZBzdpFnpGHy1cDfh97ZVre9l8VnLZYOvkK0u3Bz
0kHtTk/40SO9QjjoRw/o22/f/+uZnm7vchRX9Ayc5aysrg7aazdx86rZNa1b
TYpmsqpuaPcHyaGeu2Xp5qo/Lq9d5r+RFU0m30h0xH3Syzs+siffkzik10mF
k3xtNsUnfx9Ut1efCzf055SGF9gSb/vjm8uzi8ujX09fv39zcnre4e8PR2/e
HJ2cvXuf7O2NI+ukWOVzoueH6tbVY1iQZ2v31y3J/bZwDUt+olP2liQHKcv8
kyPZsSBh7y3Qn72NlbLsg/vfVZXvCpJPOWnMsszJLKqGP5Rv6yq7yNdkvxXE
wdXg2RKZPk2bTU2n4WrotllVfcKdJY158Pzps8nDyf2H9yePnxw+PJywCHt3
+tvk+PXZ8dHP7zvUenN6cXH2c0IqPnniZi9sRDLFO/5lu3asAp99d9tvaEdQ
sG9cQzzZY/nRL9W2Zm4n4UZHxGzfbhd0GKY5no7utJz+lK820+1cVgrJTyJM
SPHsycGjJ8/uP2Rx8uH9m9+PT99dnp8dd/Z/9Obs57OjZP8fqnIHW7WY0/Uj
gVmTLUC/zNe7gi2p92RIVSvhn5duV60XMW2O6GBKvhMP/jnz6YR1cXGl5mj3
I/9C3JJdkvE7zAoVbPCyIDFU76a3Rel2YAgmQk7mJOT44eHBn9NDosXk/qPn
h1Na2uH0/uHjx/enn/vnEVictrLuiKTosIgeBd+lo8WqWLNpic/YpWqIllsI
EjvHxyK9RE09eIhj/XDWvbvv33x8+/7V2bv4PFjPkbhk04xvJ9mum21rKyIL
nwQWW26iID/UxQ2rljOzykm8nzs6SneTl6ma+cadFdq/cqsie08quloW66EP
nJHz+jOJCLKXrv7Jmzon9UcU7VzWJ48eTB48ffz0yeT+H4eswY+Oj+ledln1
5fnR66O3F+8T8pw2DZ1cQbQ4ydt8yHoZuju7vHRkNOkVgp5Qz+7A2QMnC3vg
N4j033PaEulc1YRNte7x1O/0Llgsyj7KEocPVKPxhi8+Du34V7Zg4s2ycKBz
FjltYvnHJrt082v2Z0h8bOdz2gHZAGSp17HpfkLO94ptd5LXh8P+AmnKab6h
B8HPu91MdA8H201Z5YvmgL96cPjg4O2vP58fPXnyfHLuyLdpJ8Rsk6MP786O
J2+Ojvk///LQ+xrfkgBvC6KeK7Nf2Xga/MQROWqL7Ffi3pnrcqF+5JctObMk
REpaxWLwEyf5TbGgI3LznKQwE+X96bG6qUpZZp6M95LPihJWB/z2auNq/Q2u
9oIkFbnYGZ1PyzcMgQFHzyj04IXWz0VF3ElpZsHKzcXxXeTLg+gxB8x2k2gp
k+5KJrSSia5kYiuZRI+Y8Iu/fQCpbcHkYMvi7F87HHj8+ujj25hOHzmGMXf5
jHj6lK2lmszgOVkvBfE1SRricJKJi5pvUSPi8ERp9qFx20W13q1irjwkMTOr
t3yFDp8/G6bWopzm85XQSrXb4aPHBw8fP3v86PmU//Pk4ffuqbAA2anH1/l2
1bujnYgASVK+YUfHb01+611lpfbqlIwu0psXl5PHhx16vSXLqyOg2Jy4aOvt
nGjj7MmiZljekLnVtNkrolvRXONvH3DWtFA3J4cBWjYvWSM1pG7bW+fk+p8U
y6Wr+QknjgMGCEtFlH0WUfbps++bKr/Q/zZ0kLSXASHGu3jlFhzyI21HqpuW
2AhN4BodXV6eHx1fnv3L6eTDOamwy64sO359ThQ7fXdx2qMOy0Z27ojyrr4R
pUU/H7UttNsNSLIskt35vT24f//7gZpjWgJ7OsfXNa3e0Xv6O3yd07trIva2
IZuCRKg5mKOXtcs/kTtbba+us7OFy5uMbhzePIKyom2fXf5+cXl+SupJojnH
5xOsna4rGQeONANd0NpN2Fk4fHD4mL53fHZ+/PHN0fnk+P27j+9Ozj++7ZDs
4sPHNy9PzxPj7KIq2Q0B3Y6Lmrz8vGbKkZSst6sOI5MFw8EuEouF2DCkM4I1
zzFF1zYd7/O7ZsEJbPPs1TS72Gw5VtI3ot6R8Lq+dQ2/KPbge2774X27V3ea
uQ2CG+voiTBzLVA40UjHwZyWcsA+NlFnA+4kYTHf4lYcNLLSP+ZKsbkRTIXk
70fvE21A/NZW5LDIQTfsiTqIerW8Yk58R1d5JTGxZ9+weVWd0VvZtZiSVTBs
0vaF3WP6fweHD589ePTwyZT/+1SDEUnA6dXxRfYjFnD67sNRspvTz5uq4R28
q9piabwBU3G+m2yYlDWY6oiskx2Zk012jx+yn/12XZAxics+YOKrcvsn9MvR
ZlO6b33g56q60k90CTInv3tx+HzSMOnn0/liPcn5cbAn+V8mte2TB3RaLBcP
5BsHTCO6ixOWJuzz05Ef8Pb+wO7+wO6UDz6cn6WMMCIqVS/MrCYNV81IXIte
44Ap9GBkkkNuXV3V5Mq1EuYheUMEjS/ZW+ZbvmpPv8ctEs45ruq6IGJNfi5m
s+aOK5m9rNbuepiA9W7TVlNOirCFhOtDJ1gdbKKdH719eXZ59v5dVwQdv353
ekb6bpZQ5aSTyHlBBCGDiW9I6Wjj+WoGQ+Sfj2xZAKC95owYWbOuWCjT9Zy+
Zjml1a+e3u7+PPimR31MkmFb+zjczlveInREep+f/kYKHd4xKfX/fnry++ll
ygNHdHV+c1m0abfIfnftXzpRkIHbHxRRyu9EnnlVcAZt2BL3fyZ7fHOQk8xw
i/j1O87DEL+enl98OIXa7SYG3p+8/96RZSuO9NBX5gXdojVp0z2WmxsHpZtE
up50DNpvnCEbK//nf/6NjJVqUf2f/zl43dOo7tGK5fpC01qdx/2S7/LsV5LZ
eUZ6+JOPjqUPPNnWHIe8K5Jpj8o3E7pTn7LXlduEaGUnaZMvZtV20X3Wt0LF
j54+eQjfaPpgemjGaMKUXulK3KCrBSMl+PbjxdnRu7MOB5YahiBbCL5eRa4a
h+zIFIn/FkcexLY6zhtvdJ5Uq7xY0yVbkWhCXLNzPwfCmNnEogE1TNB5zgZr
QfQapMp3PP7H8PgPDx8+ffTs4ePnh3886pOKV33JbkRbcRijzhtvPBfru2KR
ZHt9PL78eH76pu9Fc9rs7VHP6rzc0Y7WYEBvnpdk97HtF7P+86ff1eq/VEQe
54yjBoN1DbnjYBiSw6Q0Dh4dclLh2dMeAV46MstKt4ujTRfVvOAj9xKMv0aO
xnHCJilAoEijBCYDvyuR7xJZ/kG8GHfHrVhumYxTy3k38lHsm9/WF9fdp1rm
xP9eIgxs1hy/po9PTqb0seWkLZuJa8CFXkfdpbvymEiAXRBrLaqMMQfZrtpm
+WJV0C/5L5GUZYvIEZPtWk6UZGv+N9mCbtXw99nUjNnkqc+N3qUJ/jM6bo0P
NfaZKWfZSQ2QKUEseuBl+et8/on+6nPjqT/DfyPBAm/u5dHx8euOVLEUuYUW
//H3/4up84+//9+NOaLEqSs+ArYR15w6p53P3F/oIxkpprrK59cdGfKtrR/n
dcUJ8/n8+i7xIZHciiyTtWRvyO2D/3RA9FjQvXlABvF9kiUPnpAwefjw8Nnh
weMn9+8/R3L7L437K7KY//Xwh01+5f7rw76AORaBxKHY0/VVfsW7vy3a63R1
e5PJJMtnDVzQvb0T12zYFE5uFEekrohjONlEpGGbEFEaphMJ5jxLVDYxEHKA
k2o50X+SA00WGTv2vLpiva22TbnLHNLywo+0GRIDtJUUC8NCYcNpnIzFYEZE
ypbbteSuOHJVZUtyM5hkzXRv7/K6aDLzhuirS9JrWN6yWBf2uHkPXkTykPZC
z8OFSc2HceY+0zUr6HW31zumyy4jMyUjt4roUbOIG2cF42rI43CN7RN74s0K
FIOfS19djTOy4XMScFv6TFnQbQyBGI7L8oKU3RxuXxdJJBY5L4mcbF4Svcaf
U+MBVk4BVgy7WlRTOeVVsSDG2tv7IcGMMNWis76mA204tkp22IJl67rKmlVe
lhnHXjIOLW5F0/JZbLY1uVxuuS0z4IByxVjkpG8aYprSCRGqEpALphJJyew9
2fnw1AWGkYO3alCJbuANH15u3299yHeZFyVrxyXnaa5zeHI5sfSCFCZQS9mX
L4xE+fp1TMQmTmB60Hp4S3nZVPR6Pq5FwtwQAnW+KYiVF9XG88SMDmGRkYZ3
+WKaJSRiotLl4eNiacBLZVOSvGzeek03k/YCfxxPooWsq1vGLIEF7c5cifzf
bGdkKGVXVbXwxP2TTGLa3JjIQue8wz7BGOYCZswI5LBzBOcqvauLyvH7WltH
Rhd1VTQNfwuEo6/NHQO27GSY6p7aekJ7e+Qz0o8G7rrzUnZ0b80QlXWjx0JX
vLmmy7Kg7XE6gLi6cDi2ApejQYyqpY/xERHb08mTWluS604GO1Gd6EuWwArc
JPF+5rSND1oweWPPuLceFVPCZLGMWjIqgD5N10KuJm2IxAldKEc0ayqyHOk1
ZN+5loNvCBzwvSa2c3xO/AHiqFtXlpNPa87348Z78SCXmXa2kgzzGgGWZG10
f1y5nGanvGt67zraGLuYgqayC/DXLRLXLScQFvFFSU5mzKl8QWIwbdgswcVB
jkSkQc32M3FZ3ehTlqztq1KM6Wy2LcpW9EQl51tt+Lyb7YZv+oK2lEr71sz0
HQQw6c9whCwQ5yw7IKl5C2AfSC3iPOKves6xibl4r6Jh+EzovDawAjiINRba
0lFy/J9eOdvxwa4jeTerOJfMTHLNtwt0Pr18xY9qrqttueBExg6PFbLhepH4
La5y+TeTKxZV/xzDs2SIVQ77mFvOCNAqWCaoIhAFI4b+XbJalkB2wtbUxy2u
oN/LijbAF3tGZONozN080IKJmQ2J3kT9lctZnvDdoQu3IbXhwAvMmNB4DJl0
bAAQU9IpfvmSKp2vX0WFiv7uKM9vqkv+AFh7WG+CR7f1jdvRzSIZmT4rq+bz
bd271FMS8121SCv0OrH7N7zluri6Lun/6ERwudkFusmJdOF20XLKymwkemFR
xxp6mr0ijVWWJI+IPCy7OEeAP9HL7RfCemDt9g7VbIx4h2jlxQa+hJIlBmFW
kutFZ16sWCTlDJ9g9SaCJebCQpbh1qRkHS/q9rqyywWS62Lo/oYVeuEzZWAX
+wBjM/lq2CexPPyGCGbGmrk18UsrCsdoo6qK5AOpI9Db8R0pmKhZsRQWEQmn
5GfTUQxx/xAW3bRfsP02L6Ot4PXT7E3xyd0WDTHXBhGIFfG4ij5WrSmh6NnX
rtyY/bZTa5BkDK8Elhhtma4urTAcE63h7v3TKZGB1YewH6c8+eWHDgN3jVe7
cKOEPUYm3SxXy7ZWqrtZbOdqsgGvrlGRFe/WfZ6XZDTc8IaqGWs1xybphp3Z
sck/mBbuMzyCDIk3nCO/VvQp7madqR2YR8EKs82JCq8dP3IkixqxjCkXkF22
XA7BwaDN5gE5PJblX/m04TQ7i4wa0ovlluy9fJ047XLZVNk3ou3JaiDOVecC
N0i2rZerJ8vukcdLLDm9mvINR8Tw69d92siot7sR3zA5IDUUyx3WuWIJg02u
xdhknjdeIfHCxuQufHMXxMLY666zD/T6v5y/On76/JAt2Zc/2y8ePXiK31we
h4885F8QyRhuTb/k/3z9Gq0Fdi+ozrxcNWwNgMJrcpt6SxTqr/nw3bpRQDl+
5ug+fZDMVz5akw8ddEbwzFjS83lBgIq94rc6sf1HEucjseKE4T+s2BJxIvZI
ZIfoY+IryMqO93mzLTmUrMoxPV6yBCA4Puccuh+baaQOKkyAJatbNlj1Jw66
8WfM+BN9RYRrWM83bqXJxljoRA/M2ADfrFBxQQ9d3OZ8IfQG0Z8FcalPbapl
e4uN0J0jLvBH08ZR0NZKadzn62JWdBS/uClsqJUQDMFhqegqaJIWUoBeKBYg
bkqwtJiUOfMAuSpboRucHWWiZjv7k57TI+6YV8wfDO8m4UEMxHdBEvkWCKBr
VsEkpPMfXRacTRz5P+K2pYJyxMYL5/RE7HmPWo2y3PMcsV/wFFXXddc5zY7E
RhyzA1I0uBWsTYty1zFFN2S0kJ2w5i+9ivkGzohpI6ypx0n0GU44q+aC5dFR
HznJZdYbCF6w3yO2A6tpFqpB0/LCYmObhRSbP+TYzVsST5H1za+rHapU5k4V
qAp0ImtH/RQiTvNshnQIf3AB7/SnlKRKSJElaTiDiEK7+9aVI+aCGCW6Zbf5
TnTlDW2q2vKTr2rnmtj96RlukefDVyMEG4gqRCeIFZhRdJzjnvG4JBnGssTl
wugVm8XeLtdUQX+vXUFB32QjLJRdjTnaUMLBV+4XN11uOn2VLxVJjrJkynqZ
OGVMQrNdsfFGevEuJwpGqAsa72rLZTctHXv6jWrbshPaTEfEDz4C/BV2BGle
2oIbd6yd1EjNV2z1Mx1SEyOri+YT2xnga+ZWGMQDbIGNkywRxSB3gW4fC9c5
iTkVl3mAA9HhJTdYOUJZqBB0NgyoH+imNowkpkenttQ5rY6sJ3IuaKsvoUxz
YrJx35CNrFdhkph88rfGh1w6moyj4bb0otGMLy2A+RzkSJkNgiXPRiWHeUna
O8axXZERzJxOS1G0PaJm/BIVyLQOVQJ8iH95efzh+WNyJtIoQaOczPBLUg5k
RzcWQhqpzOHnmgwdQQvQjrzEVeeTIyzeGcj58vH1WeZzpjt/YB4jasYZaalr
sZ/WIdiGZ/HJXRcaFYARKY4ICwX+TvNjGgTjiJNWgLDNw7ao+s1LYk34d1yZ
aIUlkOtzVT51LXpPMElMGZIk+K/tncW4iW4izMD1VcUxd5tW7dVRvm05TMLH
Iycwis2avPGOPJusJXmm9JgvX+jMiCfp/rLRBflJNva8J1klEuodXPoqXM55
3kiMmT7iEOkyR3ia/SY+Z95CaBI1xln/UvaiWyjWaFrZXL1GgJ8FqbwDsQIx
TtnL0ZRG5jcx9h/m6NuapDeAeONspig8CDORmiuST2RtN6tGTgcRA48gtec0
roRsHS2JBDWdCPH17XXBdm0dRYWyeywkVyTLYe/tI86NZNZcSWYPpHN3OZui
8hEg0IULNBzoQ1uaQxBFFNMI0T3EvDgWBCSLeE70h5VzCNnRSaw4gyD36FZs
I1rJghyj6ONOpAC9lT8UW6lkLZZkI8cfxUqCYrBHx+bcWN3Nhr5mF6i5rgwM
yRS/Io4h8S6gaTLs9/be8oFDIgyyCITVgtfllIyR5c/nzMqFyL+qAkZzSQKq
ukWKJ19JnkhDDjgpCY62Cj7XMOZq/8Xe3n/J/kCJTXa2Up75g/OOeCmpHjbS
ybSU6O527a8F8w+fHQyGGI4qDkURIP30PqaEhc75xwVHbXKmy1UOLyLnxasz
64N1M8cii5Z6j5842uRrDu0TvXRno32xuq/zDbRXbTdyXUgiuvOA+XX1yUmE
2D/gy5fhwkaS4MRq5FR7lWaxYdZ/MLZdoCxjt+wTCC5LRhGO/I1TWvvwxdLL
0hv29xeNrSJUAdLrbTtyr+otyT1NUPug8y8Mxs0byTsE20Y9LF6RinASkIy6
TcOg/NoEHcwCkQz7tqrEchl4bCdPIMkJCeyChzS0GQrkJf3E/ArJAL1LVk8W
hWVUZEnCRqXWFHz5hh1PqJaz9boSxvijixxgqm7IkkZIQdicRZKPrIxC7oQB
E7Qce9QIiYMoDoNUHV92vuVj4nY2wBrn1qk3a3uQ/Uv0L0KtwrQwDqmC/hXW
QQa/ThS1hitlz7w5Ilyxlo0fB5z8Hy/SDBbUEn1KnMAkWlcD+BfD/VWMxNvA
3bGUCLzWm7wQjCAeAicp+DVEqyjUp/Fg3pG8HxFDcvMt7MfZlLtfN8tZK283
sBp8vUDpQoBhajIo8bn0AXw5fFHDirc6c+JMmCnICU8ya4Av0u0126LVTG8a
TJJMUIMYia/PUZsKipGVn09t0+dmGjQDz8uxnbvFdk7vPxIa4qt0YPGPvftz
rxd2TWmEoInQqN1nXcu5tcaH4jU7gGOCZ8am26xl0JTIZiYhoiFKtDxeTC/C
K0pkDirmLTSFueewiHuxU/CFpXX0R44faYJ3LiYnR63YLmD1VUP+tz7Ty1HV
aE1Cybdk080BhXTK8fBHIu5EqnNwNXgpab81h4HJ0CA2WZb5LTzHpYMn0MjX
xXMNsRhJCSJdzE9WYEbTiRvkIR++cMzDkOVk1rZ8BZCNaDXIYVtk+s220E6x
j7T7KTysdlLNZYHm8opVx/VKFQWQIGGRDZu3PmAhr5lmJx6iyFs1d5WRL6mf
m5UuXygNYD6oqFBPVJiL0X7ereFYDCdM7GaNiNhXNSSp7NS+iq2SW5iXKPlx
dQ0VpklJTTjAZqBPgmvpNrGYKzRvxYJwSadS7uAPR2Wg7BETa1yQ1pucW3iE
98RXrLE0NSkfja6EEPCRGl3747t4hlg2mDJczSTGiABJEC1nxiVRreYmp9v0
LopnRL+ElmKgCm2hGWvOj+wQZP0lJuxfId5VJwDbyF1GsllNv6pW29Ll9P21
c3JsJOi4OnKLPZBrpZGUCqKSOHIy2034vyxiC35NwsDiVLDZXre55E4WEhXe
slE+YItCNtBHC69Mbpz5KmQAIaoouXMyREb8QXTfGe2b9OlIKn/YiAuHCqHG
u3ciBonOPVgEGDZeB2dTERdfVW2hhiMi4z4t18lrgsAsyNks7vl1Y+vVQ7Tf
l9sG88AbczAQOO4tXrQkHzVQiII7jhms+O8QLN7+ZH+SKDOJ1j7lKiqmzQpB
HmTTfeYhSpRFqdbO8YgXHgVM1aRod/ogOLdSlpSYAqEhkc+Ys/BwUOt+Gd/+
ZvSKGa7+FTt5xhgGxxhaW7E0d1QTpJZqWLrSwq35ggv9W05ThKi83Kqup67s
1GiAK1In45CvFh6fyyExFyYhkIgLVyxnLT/fNNuVRs7Y3NPLRt/Py12DkI4i
TZCbvivzPQ1ZwxAqCkcNng66bbG1iA484rL4JDxIApe4FpZarAcFjjbbao4I
LIuTcLVpoJC5hwnD9OI4IMfbfuqEI4cXZ75ta2GYZS7OQFlFgK5GlgET21ZH
C5FEg2kSTRp3eD/3NoPuniQZ6A1jTSEbW/YXEczgD6sp6HC1pCdErtbcwlca
erNG3hr2H7xqrnLrJz4FbJZxgvGTcxvYeB07QEwijoM7sex+czNOuDijnoTC
xHyj95QM0idzudVMnZgrkX4nDVZIwFJCYj/xRSFxfesEUqdwJfbA7fzv0SZw
k+DO+6vm4z1E/oZYfF/zHRtX0eJJ3bnPtKXCDbl0/uTV5XSLOC/GcnbGlzD4
IKLW/Ibk+2L2rfXQRBbmGoy45lI2t0CYoNo2HLEZx7EM79Eg1D6rOEwrsrmT
l7BcssVJVByWlRgYibFbCehUA9vMp6Aso2psw4Jd8H4bCYhdFBL3nLGo1j/q
BoW8OAmBHEI/NyQuSF+zUbCMATPXZOjvPCylszx5t9npSs2F5CGWxMeFvDzn
aAkZa/IOqEdkdvOoqIKNMnLgIQQ0Cs8tfjqpo/cCyvnyAynZRUPW1dFAEiXJ
UXbFLjFDxP3sf1jmctY4r945qkNPm9fFzEU30+cPKgGwKRyWrUoPpO29sHdN
G7SfcxaYKZqQEWvzz1pDVSiuIIRTLXaKtJzWgIkiFFNFjQqOe5T5Rmj4A+qc
DTjTg4FoKm9v75jJDr5ZSsxOkhhskkTAT8vFFJ+Jb4EzknQ+3OsliUmJuKl9
jehwNbtBxg0eb4883K+HbviK93WFxDczEL16DYLP8as5kWEwZQ6vs1gVyB0n
KCApTSx3MQQThFbkJRHnZci97DSMZ5BUupEdWMv4LvwR7j4SJMHyaeC51GJ0
SapKlOXKQsRVcC9kF/g768wyhIZZmKj5/OULmjBxnAtB4Fqyj6kSjC5TjKLC
/nDvSWcQo26q9QDwCyYzQx/TxKQF5+OL6iMruObJldYgow+96J32sfdxFPdh
0o1IE39CpG062tv78M9BvAzdEVE8b7RKACjxrm7YoKDkJ24R1ZITGZlXIPsG
QRy+Uz7H9bf4mV0MSBeBGWuVkMUX4yrKYwYM3qKy9QsAWkwhtPixbJGPpBmu
F+Z0LaI90OaeeIuXxx/G2Rn9HwNw9iW54ez+v0SsBHend/1DSmlv70JRx3eR
XUy0isw1Q5VaEJVvV9QFEhIkQTsbLIsV46KCa1lFp8DYSW6CVO5i7dXNxldm
aaSYEQ0F9Q0dz8JYrdwju9Vjxb9DkGoElBb6j7//uxirgiEh7+kff//fzMQz
n46N98UpHYVNqYHZL/3L7p28u9i3WJw66NdbsmsmSzZlOD22zld6f8SDoj1K
+Jl+Y3nG3Jp9iAaLlm849ki0Ha3FjvIkUGUIbg7s0M8dnn2IXsSLned2cBY6
J9OIH+Pj8+Hz6gHJt+AAMngCERi2WyKoYMDXiSFJEo1hLQIElDugj0VkRXcx
VlhpW8Sm761H9rWaplxqnBN2FfJyUvZxIZqiFP8KHKGBqigGrgdJRjFDejgg
QEKCGC+bIUQyIDVDgEllwzEdn9T/u+zIPHB6GvRlsU6zTt6Hm8NTCZFUCbWE
Dgmei2GrVaW6+KOa89Z/u2EVu5FCspGktoyt73gfsZW3GZGTV6lacA0EGwWZ
FvRr8YqaU3eyTyfgONfgqq7eFv6fWpbA0JFzJdWSl+RaBFA6rWwb3PN5SKnA
XsMGEveYkV8AWCuE1Zs4AYMgb9w3Plsg49b8mK22eBUn5St4Ou1uI8HF6Bok
Kce81SIOfsJUWrvhpaHuO2BSeMua8xWH2R9oooX7nMc3fVDQ/shS4losVvFC
YxydYZeio+RcHgPbrT3B16+ISeoRjBJX24p4mxDZvSnqFpBqE4cB2on6IsgG
QVtEyPYkXM8XsUIkmNwa8ZareiWwD9nCjOSK5DVLEI84rCwBMr+C8z7xuAD6
O39YVy+OkhT7dUIaYSshAeryeo3YCZluKL/iMAKfGd+MGgYXaL4FNOQff/9f
igrmZQS5Bq/Pw4oNu1mtN+iwk6CH5SF494LTjXRI36p7U3UrZIvAhrgrEuvw
hljYIJtXyf2U4Eqds2EWZc0Ul8mxgM/gkitx1KF0BPsieYcfzdm2ECx7fUSX
pqo1NCWpKVhYcVEVG+EjNgpnhag8NgFHEeJRaoQaRUZgcxZ2V/JH9o8x3Jcv
p8evESxnXQPLwuwTnzLpFV9GGAziSZg2nbgdQi3+FvrLHqWWJVjE/GQVlGIi
AThA62TGQT5HMhwcw2lQbaNZfRERgHTDwoBUCYVGMAf5LNfxSz0ehr3EObvz
wwb9NHu/jorBuglhYSd6M/vSAjv4hm0AzSUhH9aImpOPXNpjuKSfBVZCb4/Q
hxIO7GOazYClPSwKBCoXlmuhHe2bPJeFN9H6OsBU8LyERhFKW3IWXHO+gleM
L9xYo59gE34F8xV9cXFHKjHU1ikHoEDRrb9NLy3mHoAGGqaO37DaIM5oZQGi
2oLTwHRstNDSQ5GN6ZfOH4Mic8NvGJ3LwSlGwE7iLrMRG+mXfLFB1rE2QtFj
VLjQXWGf62KvuHYpUtbcG5QvSWagaT3HSAHrxCf+JI/CkiwKuXcMjSKJV0T6
ODLszdw3SztYlLw+y9YMGO8F034LdpNSRe++o71Egd7OWs4goWJijY8ldwBu
YfmShy75HOQnipiFBQH+53ZxJfBYegvZqKkTpjF9L4E8CGVQ7f+kKboQG2Tp
CVMUsRC3vuZzV6uXrFTeLqsVxQbGgHZeXfQOiXTisaRIBXsgst2xaC9QKnPB
fGkbaqz0kT+YL2D5ogSOD9mTD2j0BPlOZjb3yXGNT06oh4dsZy1xdl9CYE7u
cTzYghxbjq5qZCsgvKPdgRubJKgzULYXinVY+9x92/1VL0IgGkHvJG+L8k/0
kdVsNde5oPWIJU0K6w6PMEmM62Z0E3MQI/YNX/Un0t9rX3mlYZcmCeB0S0TB
xY3EalhIBbWbS7VXION05Burj8nCukINdb+st9M/wcqyjEZRBDpq7pDPGgvj
izSLMbvmhPlbLbAxiGqxg9J17u29F0Si5niwLLYiVCtGnJEjLVTmWhUUI3kN
dChBfwAVVIhB/fTKQCVJLEutiH+cJEFINQ4hZdH/e5zwADwE/rwIzBXTQRPF
hs8G/Eou9YsUWIzDlwoOSd5IZTUeolaiWXeVd2lt0ZxHwfPRS0MK8cCfsLIQ
WY9B3eMejfJb1tR5s1utuOvxXE10jldUCzOntZaoCPMPCteHXU5RQGBzN3wF
gQWzS22oTnwTZcssQyR9AwMdJWDH+F8EEgBhVNhCCIgG3PFm4yIQfi9bIaqh
k6bQoucmBD7HkYRCCRVLKXHTzcyJ0eyWI2IPpqq6rwjR01iXRXI8qpwgurhx
SLCOJT/WwnaNgxpjn1uyu5hLmpkZCuXf3wXzsnVnufYkuCZ4OKQK0Y1Aq+vG
WiKveYHcBIC0cIHBsyYfkKzmED9mU6AZhBK0miBGjnZgpc6L+IDZgMUrF0RS
nj4q3Q0V9iuogHpILOVW1XdILKDYrBAr3VdShfC1YvwaL/U6pcK+R0oX9ZM0
ORWPJnX+cNU4nd+7lN4oSxEs17CcneFFIlQEMCT9rEoo3JXMK+JDFocJl9dF
dp6P40dOS+E70YiDJfUfDEPq7SkJwSnfC5tUN5pYh4kl94kO8AKWK7fm+vpV
c1ALJLy1EN/7N11NkRoKrBl9XUAo5wq9MHwChyWlWteuW/0ZotHEF2lJGomZ
IdPczJYzjtIgEjIQmseJfFXM/YAT0YvQa+a+UpUx5vQK8cqkzHeuHsX1sb7G
PcXYaSbUAIdpaVnou+RdR3TbsMqZwlkVZg2cRR/vUnWWMFBpO5I0y8iqxrt3
NVbYFt7zkTq83lIRXdARBAUfcXipECZQNLCl5lwtO6Jh4jjS6LOujLSWBjJx
n6hpduTXqRKNr0hA05HYQYq5upWicym3MP+o1ZoNK1eMRVHkRdYh8epVDS/V
O9rShgCTC8bh8HKptJ7XXNKSl6ZMtXMHXeC5JYOBgC1wY1j33TPTk+w0jGnJ
IhA6Cmk0obqaZi93WpAjHvk111hZEwYzEiGQItiwwLJEYQejAwbEjfji1uAB
Yqwy17JYdMy8wiDekgfxr0BvFx87K4Gv4HlrcdRHq81Uf2jGooNFTZPkoi4K
f5e/lSNIeB7CUfmNBUkqO4wXaljAUj6jNRkMU7fT1BrW96xvLyR7RSv7Eyoh
BkLA3hfFvoz0ZGLGAyO6VC0YVUwtu3dwLnVAGXvM7EbKwbKDQl9m8RYkW0cO
qHhoDLArJTlR6lq33hUtlp/wKCK0GfD1ieqCyVO7mpFjbmzcmVaSKGEcEwfH
izKHp8OW8EI9P1YIegN86lOfJzBbOUzRQt4w8qHJDuRoX3LgsEaaQltOIO4P
AcBAolQmRzve24u6kLIh5v1NIPYMhdbMyadGyqsnO4kZiA2Nh88+3DyKEnhC
hMZH3D3shS2EkEzhe8UWgYClQroQEtH+KDluy3uC1DgMePSxc6ckDbrr7EPa
MQAwSOghdVg4ogT7OSrfKZpu6U7cm28AgqXQRMEk0K64EyojzDURy5U4y5Cb
0tKMTt1dBLn0C7QITasV8OGaaobdeBLFuHfcEZVxFn4AWzpgx5HsgNaacQ1/
ntSnmkEV6tYRdqULxK2pISp+UyM5W2/RTJ1tvCgJKEca1cd5TdTRfkCrIIcz
9g+gw4C9IQv0klodJg47cZoB0lwA5won8j6odBziQUVMQxTcMjtFRox/l3C9
9JcKbaiSCuKwbbnlLNuAjU9TEookV2WIfnrSLlP71UGBwGf70TxqOsoYvgVe
lvz6jZ0vglxhAdX67sO2Mlp6yJrOdG4YT/zyHslqLfXd9w590diz+SKwKYwN
alOWB4+foVRTwF9Wa9SzL81DEYdb8WTWluhbiw0zWdI/kW5VUHEMOtQ+AhKN
K3cBhW7hIc6KqzxGuDApCR9otJtcQK763aLMoefVJS1pDEF3JdN0y13sXabB
VJNLP3XruyQnL4CVvNkJmdira4vccHi+4YTP5scYaWgsvRUIi3uAttIicYM8
IChUKUEQnLy76NSI57OKYfmhgPxbHWxAl3t5IyjS3EtCD5v6x9//nSHBxjn/
+Pv/3lcdO9j2pWMc9PzJ/am8UmSu2sswS/ANSKBvcZTl+7vBQD3RJEbNFWFJ
Nl8Ve/AFewV5gy202BhMLcrxnYvsupAmjaSYMnUjySpO/V4INZe2qQhxw7EX
DObxGUox5E/iym+6IapdFbvbIBCDs0sTuEXrE7R5GP+CJD3tMA+WF+pzUATL
uAZ0K4012t4PWbfhPYNKu+3xrJ+nVFbQG0bdj4wUuQ6EBhmqLUdUiRwwjte+
rWTjHRqUvPBAO0NQFskIuQUdQllp+yOMDs6uWLeh/lwhjkXdtFFz3ibqyocw
x4aL49LIiOSVtFmNiOmRn8bA60FeTaHz1mgMddsG8C1R8GghDpSLSdNY7cDG
ja/5e9ycq85Zy9GRINoa9xfyDYWvEfBHZR0ySihSIEnIe/ONgXeSgAIALfSf
iRFyKZTUZ16kfzdaJimuxuM4gW+P2pfUcTQoVHZGLwmBvfjKonba+ah+JFfY
OeQIZyOumPGru8GuyJxstQNSnLIKhmIroPmpn/be3aQs1ddKBb2tCa7muli2
/by6FGF6QDiKw/vgQymbYDbmnEifBt7GZ5xc411tPzobpZzrRkBd2hyNy3pq
72hJrkOqT9KWx0hB3LJlBI6TfQGmjwzlj03aRy8pZGWEpuR+eXqTld0lOONI
0UihR9GEftwxclocKcNPS12ZgOhy6XATqGgAhCHPudem0RxXToXBOjMPzCta
qz+QDzPquxva96H35AkRdNLUk7oKpBHNl7kFvkmcN/VItIwzanOSNCVHTgJ9
sbSbk0OksCyWMAlisNYdSsZuAKemSVfltXd1JbYtKaAkX19CJlyFhuje82B9
vahWRWi50I8BS2kgmLtJcfYB8MFRWBaG4/g6JPa5QoarxYQ4leSFfW6OSy05
8VGztQxyt7kvuq+tk5p7catmJGndkpWBq7nw0kcUBcPj20v0vD5Ib+4Av10h
p1r0+7UaVKuVhB4rDLQrkt4lt3b1RjXvcAQyo0yi3W2YW8YmOG8dfSCu6UI2
oN8AXhkStbIatqWnJQ8Z/oY2FEuy54I98qGHRmc7o+uAzKHa922StcdiE4Ns
xoPdi8jitIxCnF8MM5s73cSidklepoWYMen46tN2k2gfKcgzE9vCYnUTxLP2
RmfXnD5T04Ub29pwsOwA5Zh/kDUbDj/zXIEO2pt4LUV3j8RK89ePva2Q5d/v
93TD7SXtRvdKuoNe9uE6gp4zz92I8U0gDknNs+Ojd+/6iBylusAPiOlv4qKh
vEbMyJruhouk4AXgHm9MyYVq3DCK+l7csjpqJiIVBFHtayhesBBkLxcQEX9/
bEiU2qFlI3b3YxMQnn5WDh0f54jLkOcdZ9K/CTMfOicQSYJva8s05brqjNou
mhWnnXUGkNpe9WLcf2HoG8Tm9Q3Drhnyztl3X0Pvk3JJcW6oEfdOgOSJik0O
fGi3J0lHYUSWU4U0NV2Ztt8kJpUNrmwcnHC0hPOzTxTMiy5iAeI7sN2RNSzk
e6aVUzB662tHtgysTwxhdlfqSYhj38RouQrmKmL7ibkpjaCcB5CQr8sCjN0v
dkxCuKUZQTiPpE84jJg52qfFfQqRFveNUqSSVCrv5fHjbK5jycbaxUkTIcF/
Er1BcqbAQBAyxt9L+zVEiGblVhK9raF3vnyJBoEx/UbmwA9hM0Fv7Som6ASG
NHA7vi0LL02t8u/oXgPUFKkA0b9eNpOyuTJrWYwaE9oRMAAxefZA5clsXNaC
LuAaRan+0OcOwIELRU1/ouUX64ncNJlpJ0nvedDrGvT1aL44SKOitAC6eGGN
s6JHePXg/RloecsrxGkc3/dekxMkBS0Gwc93qlFvKt7bwUrSEPjGuKd56DYt
1JRZxFPRfEMU+CDanz0eF3CNStBUwbGDjfoDdG51gM4PDbj7+hUagpgA2EZ0
Fitj3LkZxOukWwczM2OUAClb67eEEoOY9dY3LhL8JdJcBkrv9KD98iUZ4sXC
7yyAkrRpp9hdQ5OahuDQSUCCTcixYEeEFRg7GZKQ4qqbIFXzNQC0Of4JXCIH
/mcaSLdGLfBO4sEM3JFhHZAiQ833/UtqEztsI5Gm146hm6IuoI0sL4H4BHCf
2gFMLuS6Wk8kJmCzS9znFhXq4i3WTrSxb5osM2N8vhv3nKsJOMjCZUWWvBsd
JarMjHUfOeVekdyOTupNdgX7GBw+uwIYqi5yDnX/VTtEsaEHZJjJQAucRIlg
IgfdhHm+cdKsJhZpUnbdC+lchozClx9CekFYx6esP7dJ2+cO4GVA28Agp+1O
eCyE4b5faGAm9x1YxbawANmQiygtBANivotxD8sHTBzogKoOkOaivasEnAVk
sVasnsc8hAcyosRcSX2z7w4XvRYuV3f7/v5I7zh7hE/pizHf6RQcPNhvJJkt
JCWwZRMEXE1yhxdyh0zmE6pz8LcMz9F2oZgW4+ehWP3swAmLutgoIEMaKwAY
KzEGpG+Ga5uskMOq+gKYGIWwTUte5VjtAt/s1ID91tvTYrt2JONgmEsOh+26
gWX3phiFIHzj0//+RFDbNnPJNe52NtfaTEn2VunfRPoNJGsHAOmS4+GZhpLU
0MgDPNSAkwtkGaSsQdIKm60WpxdyX5zVOE1jtVFn5B90PLmGeiNUExej6XJ0
JJHxP9gfXlM/nBa3R4gGECXFDaTOJH6uV2QF4JrAhn1Im5Ozko9BdCE5oThn
I0luaR+EnmsCYIizPWJca4OhkIiWqURaDqUv6kb+Lt5e2nSExw8fHMoh8Vmi
qZVdZjeh15bo6ycJkIBAkhgT3wkuCwz6Iyj7/om+2Ns7nGY/C94ZViRaB0RV
wlKKa3Yb7sreg2l2rsW80n7BQy/w9XGKqtwZQskUlNUGN9KKHbcaFZKGXYYR
w+F87tlSCaKY47lEslPZP4pDGviANgolqTIRRSCFTJedGplGQ09FmFUStaHw
rSmsXFkTuLZRuV9v5afskqcF8ByqoytEAd5eHu0DwJRbZ1qyPNnQCG02iXPo
U9o6aymGZ70tVdTHXbaNZ8dJFutH3wUBiMMU/q49NbRhn8+TcjqCy0t810r0
AZMw9qLal5imLrJ0SikbdYWi4ZVDuUDZSIS03q4j05H2E4V26W/Y1K7ayp+F
Y6V1kSBK9chDSqCT2+JuFsU1t2KVMTEoZ2SqidCZlzlAFtZOvNnkq0wCNCFP
JvYhf0nc0UozsImgQbpioIGURIBjrBRMDoRBXdwGArji0H2DcxTJ4mRoQ+Sb
qKq200zzYhbF8TUowHt2A8sioTyitN8/npb6r28/mDR5cvjgPtrcSrqbVzDS
9HPonjIajNTmEtlHUlMkD65NdPuY4bQ0SnpCq2ESyeC0WXtUoyxJuroR/z3E
O7Ull5/lBwsq4EnxReyPM0yyKQ7KoXjPiOI3Rvb61E05sSJjezRnYn2Hjgz5
6fP1OylAh8g2vk+/89K6S/lULHEaJwQBXAocGNGAToS7tqxbtC8Xk9BzZdy9
oKj9gJM2mm6orx77BovQZdAOVkDA/egkVtnVRzp/S9mnkaQ/B87El5C7bo58
tGgNFOS8IkaNB63s8c7fq4JCvPPu8icRwmYyRUPhYk++viu3ASRXd4iUVPqA
oKAP9410HTMlJMYY05PvDHsaTTwClM1eS9tlVE/OAAcS6pjOxHBHkkrc5cMs
U40bh7AKzE8wEtilb62MM0Bke3kWAyZWKwYLwV7xYzOi3mS9KrAQvmeJqAjQ
fetb6IuEaRstQzvgtLKtx7uQ4FujFQmeO812e4so9EUUhQ7zvcmak7hz6DoR
zbCwbGyqhQeLP3ujO4Y4JypbNHkZzTfY5yNWLRagpaG7QVqAnQ9E12fVYoez
XMNY02ntin6QMV4cnVbYqCJPVRSkeckmBsn54jDTIuZyDuRW742iBTWjfZnM
klT9Mv+hbEYg2KyU4kA43BftICLVR1xP2mj27dJabNmw05Zn8i1iDYNgTrjx
aov2O6OzEgjhe9+tppHbYuKr3xpHo3HN3cLhP5Ei4fHg68IiI0zYf4vRMNlx
aKgAjXXUaDkRO0iS/3sHVCNdISQc9v/HvXg2PF9nmXbtS6YOeHp1cxAIEv1z
4tbovavy+A4WA4vHfFTpoFtfojpO20L4O6kVFa021b0j8dw/q15rmnGCJiCy
MXxrVle3YmCGloAeqImBgP0mNfibPZpeec2Sgy1vzq2YF2w9KRANtgkWUWmB
NrDRxGMyiSXUUwAnBWEuFw7zly2S0BZmoP/b8dHBS9kIe8fbVTjQeT5b8m/4
PPclJx/XFEtI1WebcFR69zX2CACLpwimNfu7SsfxOxrj9ky2HhcUzcqOqlvh
FQfDYrQzWUWuRI82szHyTqGcyvymW3ZgbXnHg++zJtWdpgkdIJLEfjCXS8YG
GQp6YFiozrX1vVwxCFYnXnC5gU9oeVshnq80FvnmRZbKP3wTki3q13LLk5a1
6XpcR+g3JSEE5Hfu+Rkt0TAZJK5KNI3wLxz7yLAZ7NwfHPI8slPjlCzXvTVq
cT979vw+gLRH9OI/gZm4xdO8YLVZ6cIAAM20241c6/UV+pwlSdJBEcIEVnBY
yyXLOZ/LwhIn2qyKW+aoXpjv+p1+FXwqFbMJGtFfCv2EBjvSosO3H99cnl1c
Hv16+vr9G4zx2teyceuKzIjjkK70OLlus0B17KKOatzxgHvTjzUm+RlLPQjt
Yzn1ZtbJSRRAO/YpXW5S6X+PkLN1PEHsbjANnIwtTJLcIcW1Dz3eVviq3BNt
yZj1Z8lp998jH1rVwcGeFzDDvdQoCRwpnmWIhg++rx/mkvlvWEm+RDp1JrIC
lAHCQ/pDa0VULEbgjTCbLtgTOmisX/fG1pTPh0UNMBrpgSNKU7x0j7rTqtmq
KuMQVZLEhnKP22GFcXGyZosSm/6KYnLijUmC8YqoRxZHvKt7OmRI6nBJmU6A
gcJgRx3PVbrFlav3+VSiaGqbN59+hBVKxoHh2XMBxbEQ4YKQUkJCkr8Lt2nD
XWhg1FV+eGGJUPHFjpwwpnTO817uGc5dmn3FLeTcwuuU+bXLeRylBhzdGkbO
IB2xxFAeE/iY2IT7abiFMGuuksiupU5DaqJqGj2S0I9hEc9XEACBnmi8ADkN
i1gkY6nt9tArquWE/j+cHKUBoo3RkyRyiUFSt53kNG1otTFR6C2wfcEm6aMh
G7/5bPG6NQhrdYks6D6TydFqj1OuNNiXUNlQ0kbcSzmWGWa82TT64AdLnnK4
CiIZUW0jCA2eliSfiOSWR1bIbKcdxXpxJ+YvDFC3dAaX1bUe7ZTMQuBJHETs
v5mRlnbwTWvZbZrTsOj0HRW8jBABZcmawQh0AJ5g2k6B8wnoYA5LBpETV00l
00V1mpx0qxrHQSZg++IWPj9lAz5jFb/TeedVMkzSRAtqtuqGKpN2Ro02YSxR
4uiz8iJ9o3Ghg9SzxDFCuGU5mAoWOWuxIC3Kj1tQNkrsYC9LbY0BmkA785r6
DkLAQ6NSYpzUQPCAYdbLaY0hwsGmkLqfvS3qjoBBCaS6PMPJO2lP0iZQaang
uhduVRQUCrDEMOuNZEjN4RIgJLRnLsfYM4MF6An+EyYAlxAAcmyJGxWTiwp4
TbnLxBJJhpXIWBeWeDcfyq65CRQ/G3lQ+0qJxG9MsAtJYHor+8Jb2SfVX3gg
e4JK+jo0MxctXuAY+x4QgBUD8AHpYun+uE8PB0HSap/BjjcyRIe92eAICID+
5ZAXoOLTx0OD1/CTpovklvsufAtBcKq1I+2YUq8H8GU02OcaI61FFeERzxew
ZUfjlHsei77cYpF3Z76jfoHoXYB7ByXECXA6cCYywxOauLYnQgOs7kIONNsr
xJMRidN+9i/p/nB+4k2w5b/8EAI+nEKN6ro0Pu1C/YLhruLR2jEyOOkhjl3I
7Dq6MOa4dEmlhbR6qtzkw3r0xNOWheHjlTQaEZAqV5lOK3lTPykgGmg7gFKW
sK1OQDNfNer2o3E172uYWZVMcxvzxwbmvCBw0a2VjvbJZYwMHUfTvzwKBBYy
jtEcGTMB+TUjNKykOz8y+6uRUu4IN3u1ZTIHjzcaIJGQRGe7yERRFVuKoLJA
v/ra3IFURliGMWASgyRbe1b6rl8pCCs4iz+liO473PZOAGsms5zoudu8A6WV
Zs2FBVC0pRx9fIMZKuG1d/jxEki3MkmtFGaNCP9dq8jZyEeRw3zXY0RovfRl
GijtFY+Feoih4IYRjhjhOt9YCKeu1ri2IdgZOd5qb8vZMMiOo/zbllYTT8Uq
go2mkVlvnd3RALERPBqH12UYwNrt9i1UtVC0QyjtiM4PRntYk0ZQWl+8t9Rm
WFI3DhhcOEFAuZGWdd6nSFITHo5EaqjRWhcdKB8Mm7R2ERLahHdsXLM2Ewoy
lC58PYm76fBoy4R49H8wCgKAC0m7cDZVuN4YBOJjQFyW7vKm9ROz3E5Mub5c
FTGX2B3SSgrBHNicnQqJJFSUvUcZXsmmPgS9hZ36y4z7kUbYphCz0zoVNn6t
RZcN37Cp1azVvAErOOuSW8EvVNucrq/YAcTXjhNFgSnml7RNvktcWUTX6ZzD
Z42ZO19+kCJ4mwtwV5dPQ9VojpBJ7C+Yqos7+nX2Jj1EA4MCVFwBKXyquFi+
27sUFjhMogd8k94K9pGCL/SwAnQDoV/6AEMFEDGwmS02SUja3kmaGRpHG5F+
I98p4kaEBbJJZrqDO9ksdZ+lMzLDd+vcg3Y7+DSYMJ067qRxgW9vokCniNDD
rulYwRAenwF7j73L6Gg60YIG9d8btpy1YD0CMaKKk1l+QIKG5Qz2JvcC0Zq3
9rsxfsP95RSR74gYYprDHBbNcjFBiLEloxBuoeXN3YiZCGgNmIcGEwRkZpVb
tb0BBhoumcdoWO1DHnGtwQiseLPfGywpjN9XMzHWPtCHUBNqruJ99nIkkfzL
fbV63CCrf56hQeyM/lStJRDZrxCDLX/neOGofRwGRrJBtq2lyrTvwFj02l6N
XL3HRfNvWbpLb4+uYa4CVwfEdY3zqfaCXGLYGgcGihZclKTn/Xw5dL6pOcAp
UPVAlYCnH4pdpPOBlxZfG+bSALDnoeIJZshP5pUGctghr2PYWmf7FAEPFuNe
XAwkjBIwPw95wbQX7qkgl51zt7yF0Jzhn8RdnLulNj+uolySk157UV+0uCua
tG4yhJEQQ2SyhnQ8FF0mJvnJudZsUihkDbTnZV6stP1pvvDBqyv4uX5wPHeM
T8pC6VGjtFLUV48YDN0a4NOru92IFdMtQRq2exl9JCPeG6myljilZWj1kmBA
wsuj4+PXZzzkfIk+unJT85WD3YPYGQstCxwIiqeufOtq7nX6+t3pGbIsiMJU
3qS3/fZL1WeY8yEOj/yXKOd46BVyBChKjcHG5ilIpEmQw0ZVbalPlsan3otG
1rZ+hXqxWVWrEuUMLhxrmRTAIjmu7oliUAr7CmHjwfntSfrP4E3CEYN9SJfc
7Gjcl/x2qmZRwyJPRmRGoN0hQSgRkdAOxgpvzSLkyoBO0UmodAssteEWdIxh
5ZIBLwbCcu/BprMRaOlCPMBHeuwL0N4jeXmZXZCxlvIG68Aacftue5Kwl75R
3JDfVyNY/ZuOlxpLlXSYKEaf3rBQktr9MDU17v+K3XirZd8imH0DUROSvdVZ
z7AA/ei/7vJ622jDDYEBS7WgeikYaN1hhrSMwppE86xfQU6J3Qxthgl6yJiD
kFE8X+jZ+rnGMqfLV1MIM89KG4RFcjeVtzJNoFFLBd1GagVjGY7eGgwaWJVD
aOr4RXMJZZ6zn5jpPpMGaIR8rU1PpTNsuurQeCNBYXjfrlff45LxgK98jPrL
D9vNV0s3kGxrr7UTjwfQJ7E7bTuZotWZftEgPvRTDCNg9eQ7noB26GXwddJi
X7oJ24mPu02Z295gdR8Et36R0uCPc3ksmEx+CGsoIEw85IlMbU+tB6+g4/WG
/doYCx4fFEdbzbmOImc6gXu43gAZnVDc6/Hs3diPdS+x4QqYo0ePHCnuVEpM
VPF3QkAih6RVIxxGM7xaTCNG5UraEULmDMl0k2r2p/Nl+8MoCAv1dvCyfJWk
q2JV7xAkru2OZaPIMBZDXZ2LhSINBVELG0JmqFuir5PJ6DibHSaF2TvUZFki
DWiSHFjUZ8IQmDHzVkKDVh0YG/60XM42SUSSzF+ZdNJrLh33oY56kgMj7anA
wa8fI3qNeyISvSYkdmchT/oW60nBjZXVTPuksNyDmDBuMm7UJjtxlXYcpOxp
vk5nTF/pkHAx+98RQiN2bwVtRJaEb6gbOlHLoOMUl/L+9PhEwfMW6ecwYVto
vXdEDJ+MGqikRefolBG6BpYI/DjjmaOftdRDxdvWAW4z8/hhX3jQxxpJBq3S
VkUQyq4tW/Ply7vT3yZkRx4f/fye40bIqMXLhlcY9qRJteuo7076/AHm4LhX
tVg0/Xh8MqVSBGKILfrWv5GbDyS9dOJVVaLI+qHXMrWvhA/jcOk4bEdmOvuI
3qZolyQllZvRt8iSRvwsTPwqrF9F5KiVBak/NLcXJ6yqiyucShQTPXq5b7C0
EHEV9g+Jj+CeWbcLD2YHgE0GXGgQToK75vdJJtTfPywerUS5fwKMzsi37d2V
DlOSMQGHUB4+NhJzXDIKiOss2XXOtrnE3ce+ZC+EtYyaIrQw9cMpXDreNGIh
A4axhRDZmWeuf0cn8e2yYDorbSXZK6dMGpI2vplCVEj8NbT35dZZjVQf/oT4
uZ+aJfiPDVsUi7jBW4ZRFbdeEaG/b4W+Loan0lmsHuElwQI/tFjmJvYHA7D9
5BS2J1gfKQHvbSuVW78fvWedMtSpGthJDyb3beYkFA/brdVkShMd3o1AGzXf
GKY0qT47fffhiElIe/zy5cP5Gb3dN+JGdx3mDonmSDMBCWsEW6xKwUBF3GQ8
GnBmtiU45Ke0ByVONIz6QEXoVz/s1fpGINglo+y5QEv6f0fRn7tgNjJhVW6U
DCvqYXoUIJCWy2v1M4o8UhflJ3FQ1V1Vc0rSv77ol3HQWgbpO535rrc+Wihb
i4z+VifbDxVaYwwh0UTc3VZ7yw6ClLjZuqDDhZVCQhrtSz0Re02uZBe+k8I0
ghpoevxeCCiZfJZ3oL4PNRMeXBTAnZwUnG9neVTSyLCinWFyrfo6QuXqLQUs
tyNlOFNaom5zGbpTjb3PokB5kZQRVN6Sx3KhtSFer1ZKStSTym+ZRKmBiHUC
oIaA5Q4dNWZXQobCoiyVKCiqu1praCag7RnErxj/riU2C02gl0W7NghzFKUh
QcZywYtaGQ1+4cehfPlBHFqGBVxGA1OG4DZ+Jz7fGnwTjVJIanDthy1LHww/
qFMLZMM0Fute1OtGjpLXpIwvpBP29njgYMAthV6ZYgvIpHtkrKKug4iJRB3g
f8pmnPbW3tBJt5YOID5djE530taaHGtTV+XB9JC/jKrsB4fPSDDJlBBr9xLm
b3U7tmad6VbYgrUjiQYt4wG2N2uO79sTFf0xQt2BAnW8j9nOpgQBhc2f9cVH
MePqVGsJP4dyz3IXYMqIA4iiQ26C86ISIZKGD6aTwlot7h76T9jDwMXpkcic
LIMMoykPuspZVZ8t1Hfv/NyyB+BX+DkCkyCXGE1V0rI+FJUL9TtEC8uIYX9G
/TwQofM9nUrPmezsnpmGL5KymX0enSmZWhzwNeSb2t0pbEmf1hSa35RVo4Gg
XOnuvtKGlnFAgUsBtSlfHgtSsxRkM36kjLtRc0acJL56iXveabE/uBzvtbcy
39Kn1qOZB3D0OpUoiZNLGnIByI3kjfI4ZIa4AQuBuLm2FTNKZ3O2YztSBk3Z
/fQBiQFo2YzWbRt8I0Fois9ucz+DjNCgCy5XgKqqlyDFpagJ4ODA5eU5AgSn
kw/n71+dXV6wh/YbY1mYyRcDQWhrtWluZGXpKAs5hhP2E2CjjtyIbYXWZuME
b6NOM3BcvjkAxt3vydhDjAc50VJJCbJ/QKcoHoKYmGOayo96EkkTfSfwNelk
XoZaZOF2ueOh2wtc4njWdXeiuSpfaXDuGA2RLzSByla6fKk7BU4KuOWUXuzt
/Zfsj1NtZjjf/fEie8suY4Sg7czXQ/4oGUYpCMOwaqSV+MKzSyawxm7HXp11
wFZJAjfklSHbE7UMB6yv1joE30/aptsCYLC+KepqbWYEWrMluWWdd2CvDfyt
+TTIHYbhEMV2veYKEqPE8fg+fW0M3dHGSiiX1uhDSAQmY5IaupnmFwvFPTZo
kxf1BGuYbXeuPqAFcjQTqR+2UL4cn50ff3xzdD45fv/u47uT849vUTFFx3cB
pcVTSOj4joM4wDyhwJagQJcP0HlZqnW29cJZ+zZ/+EAT6cwnK1TyoyE1+ARQ
3dVaZjKUVS7RCGjVTjxU0x/fCdr5eW7SUsCVy8l1BV/WQAiy7UT20NZfS7A/
KnzpzynJw6SS+B74avHu4Ye4TyrqusFPY1fUQTpFDtfV0iGfyYwaKm6tsUY0
8dJ3E2JbsAX/az6BU0Tb2sWidZH2kQYxPohRT1R4NVBUgB415lKqr+wfNtv1
222QKZ1bL54IjBuQir4+UvOUEqqNh3voDJLQaXH65cvbs38lg/BM74Pd6FTG
+VFBFn0OxlY8iGUySVkrBauhT5TnQkRiUGnrQ2E8ZTnnSwPUl3H4WLKozk/A
aKoJe7f0sH/8/d8rMt9v+Atcjh0NRrdYBNu8zx88vM8BCavf5SSlVSfjlLUO
l+fBLbQDA+hkHBTi0+xZynwYH4+IkY9KxO9K+5wDk/88Fshmt3mBH0dqAzhB
myn2LQKbohVGzSQ4lySfKSis/QE1r5cBysECbj46mbBk9Mr0vnaw56GrVRBv
Gq5l67xl5GqUrRW9F7gyKakJYHfDO7bWH4D7i12BqXz/CZ0qWNncXHuoTdqi
A5KIVTSxr+GOM/EsVwAxCoMU4HqNcm6hNELPoQYJBI3AqdWmzqj2MxdzSKJj
vSmXjcjuoGT9xqIhDpLO3dnatVV55PGq3AhnpONu4zNKedOOlttv69TPtHBd
jAq7MGuAbYPD3Q0iSq/3jseMiSi5Ni3sD8jtUGaXVG1YWDAAGq2rWCQx/Cyu
zsNlxg6bfAiLh6GDHFbyxghaPMisIfThWOYc22KQUdoSzM9Z9VSI6MMdz+Zx
HEIBIfMcjkdvFkrRkcBMowufSyED493p8WVGruZ1tTAPyBz859OH0yf2JQxN
lRyN9SCJ8q/Blwd235elDJJLotK3yUhSIIjEttGdh3OSadxyDH5K6V/OJidT
evyqYeDzqtCJpTBYOQwmtVtR6CG129Ubl7kp0fp2Iw8zh619zw96kbRMEpHa
GTaq2dfuxlyVLSmMtU0XnKmS6cRAuvljktV6SuwxN+gkGFbsQuNrGI2NQhHY
cmx0TpufvLSOCb7TWKsO/yr80BRpgFvuup/ntco4o5QbHk6fRrwQAuZROxso
9Du7GEPfdPvYIPRjgyrSI+Kj9wg63wvUWD916Gx2oH0qyW/pVUCLS+3ZYSrd
Kh63G5vuBVA3QEunEjeIgARv6SaVOYy1Y2JiCRp/+SFEDDh2FUd53eAEImCS
0hIXh6KEMJFeQJ3SCoQ1ftLxA1HaRS7V6cjmWUAwTm/wF8RkIINmWeZks+U7
6WaUbTdXNSMD+4Nqreh8HOuouYQbUHBte1UZJk36fIhFB9HlZt6wcNLOFmrY
BdCFjPSASgyjWqURPkMDpK9FOi5MG37G1pFEB8JrkwGUuXaIXN6N2FTovJX+
xa2yghy32XUsYEIFWy/1ONuZV35H/En6lilPWxwy6QJBxqvzuoDhGFFc0idQ
dViXBWuiEQV0NBL7lZEo1W1Pc/JjL94ffYibJtIlp98ggItAYjL/irnNRuJE
HWZieJSssGQ5LWEfU8IawhKTXfI/QTcVwIkuHTKPgUjRpIJ4KuZCJKx53Xxe
KZL5ThijL+2QpRtgvuawn9FLE7hoBKBB8TbqOMeF+lttg5MKHvGG5I4ZYpUv
mcXCOhyisrdYqViP0VvTAUvc9uDT5lJwK9iSsMrQEEXpSI/7KfahTHmsWIK5
GLfrx8ens8xwgk103SVCbUHjpmt0x64M4jrSAdXflbRt4t7eS2ng4XuB+heN
pcIt0mdDd5uRob2MuC9ckKIAqQ5JfUkJ2XK60EWzVxGqmxhtugXf3VJf8CSq
hhZ/5nO3jo+LPutbMFVkmukI7WFQz3oxBKyJcwaaB/LIpn6ndrXxjED9Dr1J
vSCMBgWSt76qJ11DW2kfAz99yBag6aaoaZwffVqlMhgmbAdcqOLU3ANSAZiy
1gfSBMQIF4xzd3e0tljpQGQxpbx01VG0y22NSymlkwq1iQjtU3L3bCA20LzW
2ihNkaO+/MLiMmYQiI7UiXJW1h+Esjqy2uvDR3W0a2o11JE5ysVHEtajpgfR
v4guW4Or1a4uhD7hfTatbm/C9ev5/BN2czT3ng2MiO42fHxaG47Cbw+u80tu
ic8tfUlw0T1YSIaYu9hqOwOo7G4E+SiCRGUvK9Z5/N58LSD5X+hO0mc+farG
2a81oKDkvtQLbr5/fI1f0Etfcz/nVT7O3rKwoBP/dS392U7Lgsj+xvFNuCSe
2WUfyKPStPZbviZrLsdjB8FAU1JWHawoLSeH7bP3/wMdluIV+OwAAA==

-->

</rfc>
